247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:38 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:38 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x0, &(0x7f0000000580)=ANY=[], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:38 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='ext4\x00', 0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000240)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000040)=""/14, 0xe}, {&(0x7f00000002c0)=""/85, 0x55}, {&(0x7f0000000340)=""/105, 0x69}, {&(0x7f0000000400)=""/73, 0x49}, {&(0x7f0000000480)=""/145, 0x91}, {&(0x7f0000000540)=""/93, 0x5d}, {&(0x7f00000005c0)=""/98, 0x62}], 0x7, &(0x7f00000006c0)=""/176, 0xb0, 0xffff}, 0x1) sendmsg$kcm(r0, &(0x7f00000031c0)={&(0x7f00000007c0)=@ipx={0x4, 0x100000001, 0x9, "2e1c331720f5", 0xab4f}, 0x80, &(0x7f0000003140)=[{&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000001840)="6e151f1140fe64866389fb0913d63e73ba54297b2a7d8b39108803a3fc7dabb1d3fc8520d87f00dd506cdf80c786ed37c97abb27d06513a9e4db0a71bf27a72495f27e06578d0c71d30f82721e342aa9d7422980953c5f0a7c03e336befd4c196ff80261ac828f54f623fd41a13dea6284b9b63dcfced900fadb1e404b535ad8d79fbe51588abe26dfda9c65a4d9ae7bbbbaf4eecd6d111c1a4b3defe23909fea7a4ac102a9b6c54adf9c2ebc4b14b7359bf961e89413646ed5608e7cba0c702676fdfe342896c", 0xc7}, {&(0x7f0000001940)="3f272f91801e2f10e4ccc4a6f3ba42dc49bf917a5fe664f21925a66cb4ab97d49b", 0x21}, {&(0x7f0000003000)="2c928e95d487d4badd1532a753122768fffb3a3f0e06f1970689951d9f45d4417cedb9f39d404e329a607ddab0a43a7ec7116230e20359eacc2551c553853c25479a37be648387deff99c62922f46e8add20ecfde705d3cbd6bf25554e999fd423fc5d12bd508b9965abed6e276fb866d35d80ba6b2b6c30731e574ee7dba7ad2e5c8d263171e800d9ed4af76257adf92e141192466ab6c002d10f49", 0x9c}, {&(0x7f0000001980)="12ecf69e40782611417c6e27331b0e786b80b18c796a11cf93acf12af2c764933ff1d716d9", 0x25}, {&(0x7f00000030c0)="ed3688b07c3b91054f0304e0eb53dd3d8aab8cea25f92a03b0288b124325267972e65d8b20822a376ecdc2442d66e549dd3a5bc54489a3709ae2d7d60640af488a5d468b4958630f506774cde66395695e176ccb4100a8c2390cb929af53ef", 0x5f}], 0x6}, 0x4040) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0xffffffffffffffff, &(0x7f0000000080)) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000002fc0)={&(0x7f00000019c0)=@generic={0xd, "cc05ed8a1c0165b1c48d91787088a4aa253de55e5cb186798338435096205a51fb33b750ea626aa921fa8703e4a8a1227c3b1455d0d0df9db2e7c4a7101f89cbee9507175610f0f2aac92a12f0e9b516dc574bc9519d0b65ea302a0106ae15b4ffec22c335a9d14837640d29bcef38e146de1d6e5438ab4b405d7d0b2bc5"}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001a40)="d394ad5b6036cb4d6e1cf79847a2e4d494b1f39e0f240150cac01abe637cac029f75d26ce0326e499c153ab0377049770f791c615f727321359edf2f72ebc80cc52b803c3c5ccd3e125b556f9debd192069d006771fa00833dcc1ecd13bab3a979931f5180b53901295c1c06ce470779038ef9b1052ba7310e89382bc26afb0d62b463efc7413d2e832939504cf74afa5d3db50c4b572e6ae69f9ffdacd3e71de57a4fd0fdf47dfc03c53e2ab92066fb5c0c668acd1082ca438bccd19ae2892fab088f23da84005e118d2af9155b4692f8e07a", 0xd3}, {&(0x7f0000001b40)="076d2e0b2401c46350f28975ea0b5744f71e4a84c3256af15dd6d010d889863ed603c68476fd8cb3c0a26195ce226b21bedd9ea1bd46adb122021c31012b8910f8145a32c275c1055412a7bef63302b1b7eb1bea029aa3ce86b5bd79850760078118b151ac04410f0da9fa9bfe294046a3b1368a06da127b959435214962422e3b918d23895a81386fed758989c236351d4fc1dc77493e90c65f4836424d48b53916a48614ff4a3e9d59b1bb0b698e16ddd67e4c6a461e46a931f914260a58e280115e5adb2cd42cc214249d82cbcbb85729e6", 0xd3}, {&(0x7f0000001c40)="d096e7b5942705e86045bc6097f61198650c48b3185ac1f531b229824ae6f4f3d8a51701605441b2c65499eb16a8cf8b5f189f84284c8083fc7cb885ccfbc084948a680d75306fd346bcdebd7b578ed55946c54258098761c3ecf1e8f8fd4d875aa52ed53cde75ea9ef34abf70c56349cd66367d10972449573b7a02a2dd8445b25f761c3169f38748d10e16a11c45ec0849b88385a1e03cbbb0314fb87dbf7b68f379f15487", 0xa6}, {&(0x7f0000001d00)="5362eb92e40fb39631a0", 0xa}, {&(0x7f0000001d40)="6968cacfa5c278f988ffaa1a21a2231c4381277d27d25b376d1a82f635acbb3dc8ffbd09af2d7a2483b3bac0c437", 0x2e}], 0x5, &(0x7f0000001e00)=[{0x1010, 0x105, 0x224, "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"}, {0xb8, 0x101, 0x8000, "a51358fb216d5b986588d06361edd50b6b9c8e7a4283c91a5dd4a96f31362b67394e1e0e01c911f633a0ffccca6f7571780bb0c3577e7a012c90e2a8dfcfca495981be5e6c8ebf30fc64cd23fa782dec3a77408a2cda4e6ef5a82e02ae8a783f648fc555c920de115a2d21b66e070e69105697ab66e3ab99815e107b7c074dd5acf416a54a63f0e94d22076e8da5bff4860fe86186ab0ecee288b974c3dc6de096890afb56f89fa6"}, {0xd8, 0x110, 0x100, "e1e6f9d33fdeaf94c950f4c60f7ee0f294174adf9570b13f48ce4d406ab4b8ac6ea9594f4f9b3bb1e810a629368a66e3d103f1ff9edcdd26cff6d10531f54f005fa3a19c45f76fb20051a7b9a8259d14ea3284a2064d667eb7b0d1b95659f98609a7b93ce34b679cbdb9852e58b0e4a0b1a69468afaa1091ab0492943af4dcc615399aeccff47f61edea4f06984ab6840f732b4cfbbfeea541b160b3e24ff8266ed2f00b51effa8ec32b1053182c2e25dd3392a79a114ed1d359bb04955a93c15696c207a098"}], 0x11a0, 0x4800}, 0x800) recvmsg(r1, &(0x7f0000005600)={&(0x7f0000005340)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f00000054c0)=[{&(0x7f00000053c0)=""/218, 0xda}], 0x1, &(0x7f0000005500)=""/240, 0xf0}, 0x2000) sendmsg$kcm(r1, &(0x7f0000006900)={&(0x7f0000005640)=@hci={0x1f, r2, 0x1}, 0x80, &(0x7f00000067c0)=[{&(0x7f00000056c0)="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", 0x1000}, {&(0x7f00000066c0)="5919e35190d58314d2825be77ba15d9252024657192ae42bf0b2f567ba073ac28c03a57f3fade77116619e13d230453b32adf01f3c7da627c2b3a11235d61162fa4786e7d9a8b7f3373548909b25b79f873b1e4c417de3099866e2b86ef5c463ce68699b7f25bcf62ad79e0bfa39e76f04a0b40da0b7b870f8214e888c3c67bec50e4a009418a3a6c9af2d8b8e7f50c25ed385b3673f8a865d38c64062f9f8100c49989334f20f9ad01bd799aee129843ce387f5b953b66fee7e0a65e901e511d59c21807a3c3df1391a80b63d223483b4441e612fc80038379aa8bf584fd4b5539314bbaa", 0xe5}], 0x2, &(0x7f0000006800)=[{0x100, 0x112, 0x3, "1fcd06d4c873a9cb6a8e2beb44b517fb4d080401a55adf97d359ad263ba908b8338727b0cd675de7fe2ae390bcdd15dc14aea22cd7dfd4235101a8551123a6d601d415eafdd163146c50c9ea3e62fbca7a71a2cfa0503b160a51023f3d781a80600afbb11a96423cc7b1f240de411f9ed38a2c13f922a4f521c3db23c4d3237931cb342b23d732b43777a59e85c651f4cf498b31d50592571b3ceb295e557b808e39cc2cfe4f00366bb07ef29496979867c6cc5733664986783f824a8624900863474a939ffa75bb92ab32451a888e9f2981f92bb23e2722a69984c7db70a57819de7cb60b866c60b403"}], 0x100, 0x55}, 0x4000000) 2018/03/31 08:42:38 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:38 executing program 2 (fault-call:3 fault-nth:10): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) [ 84.164966] FAULT_INJECTION: forcing a failure. [ 84.164966] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 84.176794] CPU: 1 PID: 9777 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 84.183954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.193281] Call Trace: [ 84.195848] dump_stack+0x194/0x24d [ 84.199454] ? arch_local_irq_restore+0x53/0x53 [ 84.204106] should_fail+0x8c0/0xa40 [ 84.207799] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 84.212880] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 84.218061] ? trace_hardirqs_off+0x10/0x10 [ 84.222363] ? pcpu_alloc+0xcdc/0x1120 [ 84.226228] ? perf_trace_lock+0xd6/0x900 [ 84.230352] ? perf_trace_lock_acquire+0xe3/0x980 [ 84.235174] ? trace_event_raw_event_lock+0x340/0x340 [ 84.240339] ? perf_trace_lock+0x900/0x900 [ 84.244551] ? perf_trace_lock+0xd6/0x900 [ 84.248672] ? should_fail+0x23b/0xa40 [ 84.252540] __alloc_pages_nodemask+0x327/0xdd0 [ 84.257184] ? perf_trace_lock+0x900/0x900 [ 84.261395] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 84.266393] ? find_held_lock+0x35/0x1d0 [ 84.270443] ? check_same_owner+0x320/0x320 [ 84.274740] ? sget_userns+0x27d/0xe40 [ 84.278606] cache_grow_begin+0x72/0x640 [ 84.282650] kmem_cache_alloc_trace+0x3f1/0x740 [ 84.287294] ? sysfs_mount+0xc2/0x1c0 [ 84.291071] ? mount_fs+0x66/0x2d0 [ 84.294588] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 84.299315] ? do_mount+0xea4/0x2bb0 [ 84.303005] ? do_syscall_64+0x281/0x940 [ 84.307051] sget_userns+0x2a3/0xe40 [ 84.310739] ? kernfs_sop_show_path+0x190/0x190 [ 84.315388] ? kernfs_sop_show_options+0x180/0x180 [ 84.320294] ? destroy_unused_super.part.6+0xd0/0xd0 [ 84.325378] ? check_same_owner+0x320/0x320 [ 84.329675] ? rcu_pm_notify+0xc0/0xc0 [ 84.333543] ? kernfs_mount_ns+0xb5/0x8b0 [ 84.337665] ? rcu_read_lock_sched_held+0x108/0x120 [ 84.342655] ? kmem_cache_alloc_trace+0x459/0x740 [ 84.347471] ? lock_downgrade+0x980/0x980 [ 84.351602] kernfs_mount_ns+0x13d/0x8b0 [ 84.355639] ? kernfs_super_ns+0x70/0x70 [ 84.359679] sysfs_mount+0xc2/0x1c0 [ 84.363280] ? sysfs_kill_sb+0x40/0x40 [ 84.367143] ? alloc_pages_current+0xbe/0x1e0 [ 84.371618] ? security_sb_copy_data+0x81/0xb0 [ 84.376176] mount_fs+0x66/0x2d0 [ 84.379518] vfs_kern_mount.part.26+0xc6/0x4a0 [ 84.384078] ? may_umount+0xa0/0xa0 [ 84.387681] ? _raw_read_unlock+0x22/0x30 [ 84.391805] ? __get_fs_type+0x8a/0xc0 [ 84.395672] do_mount+0xea4/0x2bb0 [ 84.399190] ? copy_mount_string+0x40/0x40 [ 84.403398] ? rcu_pm_notify+0xc0/0xc0 [ 84.407263] ? copy_mount_options+0x5f/0x2e0 [ 84.411644] ? rcu_read_lock_sched_held+0x108/0x120 [ 84.416633] ? kmem_cache_alloc_trace+0x459/0x740 [ 84.421452] ? kasan_check_write+0x14/0x20 [ 84.425662] ? copy_mount_options+0x1f7/0x2e0 [ 84.430135] SyS_mount+0xab/0x120 [ 84.433561] ? copy_mnt_ns+0xb30/0xb30 [ 84.437423] do_syscall_64+0x281/0x940 [ 84.441285] ? vmalloc_sync_all+0x30/0x30 [ 84.445407] ? _raw_spin_unlock_irq+0x27/0x70 [ 84.449878] ? finish_task_switch+0x1c1/0x7e0 [ 84.454350] ? syscall_return_slowpath+0x550/0x550 [ 84.459255] ? syscall_return_slowpath+0x2ac/0x550 [ 84.464160] ? prepare_exit_to_usermode+0x350/0x350 [ 84.469154] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 84.474496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 84.479316] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 84.484484] RIP: 0033:0x454e79 [ 84.487648] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 84.495334] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 84.502577] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 84.509822] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 84.517069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 84.524314] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a [ 84.545614] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:39 executing program 5: socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:39 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:39 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:39 executing program 2 (fault-call:3 fault-nth:11): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:39 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x0, &(0x7f0000000580)=ANY=[], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:39 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8000000000000, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) socketpair(0x2, 0x6, 0x400, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000240)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)=0x500, 0x4) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000080)) 2018/03/31 08:42:39 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00'}, 0x10) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) recvmsg(r2, &(0x7f0000003040)={&(0x7f0000002c00)=@can={0x0, 0x0}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000002c80)=""/131, 0x83}, {&(0x7f0000002d40)=""/241, 0xf1}, {&(0x7f0000002e40)=""/224, 0xe0}], 0x3, &(0x7f0000002f80)=""/142, 0x8e, 0x10000}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000003080)={0x3, 0xf, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, [@generic={0x2, 0x100, 0xdcc0, 0x1}, @alu={0x7, 0x1f, 0x7, 0x8, 0x0, 0xffffffdc, 0x14}, @alu={0x7, 0x6, 0x5, 0x2, 0x1, 0x0, 0xfffffffffffffffd}, @generic={0x9, 0x1ff, 0x5, 0x200}, @map={0x18, 0x6, 0x1, 0x0, r1}, @map={0x18, 0xa, 0x1, 0x0, r1}], {0x95}}, &(0x7f0000000340)='syzkaller\x00', 0x6, 0xe5, &(0x7f0000000640)=""/229, 0x41f00, 0x1, [], r3}, 0x48) [ 85.116830] FAULT_INJECTION: forcing a failure. [ 85.116830] name failslab, interval 1, probability 0, space 0, times 0 [ 85.128110] CPU: 1 PID: 9811 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 85.135295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.144641] Call Trace: [ 85.147227] dump_stack+0x194/0x24d [ 85.150854] ? arch_local_irq_restore+0x53/0x53 [ 85.155533] should_fail+0x8c0/0xa40 [ 85.159249] ? is_bpf_text_address+0xa4/0x120 2018/03/31 08:42:39 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:39 executing program 5: socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) [ 85.162911] 9pnet_virtio: no channels available for device ./file0 [ 85.163747] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 85.175177] ? __kernel_text_address+0xd/0x40 [ 85.179672] ? unwind_get_return_address+0x61/0xa0 [ 85.184610] ? find_held_lock+0x35/0x1d0 [ 85.188672] ? __lock_is_held+0xb6/0x140 [ 85.192742] ? check_same_owner+0x320/0x320 [ 85.197063] ? rcu_note_context_switch+0x710/0x710 [ 85.201995] should_failslab+0xec/0x120 [ 85.205970] kmem_cache_alloc_trace+0x4b/0x740 [ 85.210548] ? __kmalloc_node+0x33/0x70 [ 85.214523] ? __kmalloc_node+0x33/0x70 [ 85.218499] ? rcu_read_lock_sched_held+0x108/0x120 [ 85.223521] __memcg_init_list_lru_node+0x169/0x270 [ 85.228472] 9pnet_virtio: no channels available for device ./file0 [ 85.228791] ? list_lru_add+0x7c0/0x7c0 [ 85.228803] ? __kmalloc_node+0x47/0x70 [ 85.243027] __list_lru_init+0x544/0x750 [ 85.247088] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 85.252962] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 85.257958] ? __lockdep_init_map+0xe4/0x650 [ 85.262348] ? lockdep_init_map+0x9/0x10 [ 85.266391] sget_userns+0x691/0xe40 [ 85.270084] ? kernfs_sop_show_path+0x190/0x190 [ 85.274733] ? kernfs_sop_show_options+0x180/0x180 [ 85.279642] ? destroy_unused_super.part.6+0xd0/0xd0 [ 85.284732] ? check_same_owner+0x320/0x320 [ 85.289035] ? rcu_pm_notify+0xc0/0xc0 [ 85.292922] ? rcu_read_lock_sched_held+0x108/0x120 [ 85.297921] ? kmem_cache_alloc_trace+0x459/0x740 [ 85.302738] ? lock_downgrade+0x980/0x980 [ 85.306871] kernfs_mount_ns+0x13d/0x8b0 [ 85.310908] ? kernfs_super_ns+0x70/0x70 [ 85.314950] sysfs_mount+0xc2/0x1c0 [ 85.318554] ? sysfs_kill_sb+0x40/0x40 [ 85.322418] ? alloc_pages_current+0xbe/0x1e0 [ 85.326894] ? security_sb_copy_data+0x81/0xb0 [ 85.331452] mount_fs+0x66/0x2d0 [ 85.334796] vfs_kern_mount.part.26+0xc6/0x4a0 [ 85.339353] ? may_umount+0xa0/0xa0 [ 85.342958] ? _raw_read_unlock+0x22/0x30 [ 85.347082] ? __get_fs_type+0x8a/0xc0 [ 85.350949] do_mount+0xea4/0x2bb0 [ 85.354469] ? copy_mount_string+0x40/0x40 [ 85.358678] ? rcu_pm_notify+0xc0/0xc0 [ 85.362546] ? copy_mount_options+0x5f/0x2e0 [ 85.366926] ? rcu_read_lock_sched_held+0x108/0x120 [ 85.371919] ? kmem_cache_alloc_trace+0x459/0x740 [ 85.376737] ? kasan_check_write+0x14/0x20 [ 85.380947] ? _copy_from_user+0x99/0x110 [ 85.385074] ? copy_mount_options+0x1f7/0x2e0 [ 85.389546] SyS_mount+0xab/0x120 [ 85.392972] ? copy_mnt_ns+0xb30/0xb30 [ 85.396839] do_syscall_64+0x281/0x940 [ 85.400703] ? vmalloc_sync_all+0x30/0x30 [ 85.404827] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 85.410337] ? syscall_return_slowpath+0x550/0x550 [ 85.415242] ? syscall_return_slowpath+0x2ac/0x550 [ 85.420152] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 85.425491] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 85.430313] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 85.435478] RIP: 0033:0x454e79 [ 85.438641] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 85.446327] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 85.453569] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 85.460815] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 85.468057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 85.475299] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b 2018/03/31 08:42:40 executing program 5: socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:40 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:40 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x4, 0x4, 0x8, 0x6, 0x0, 0xdf3e, 0x6d19a2ba922044dd, 0x2, 0x7f, 0x7, 0x1, 0x4, 0xfffffffffffffffc, 0x7fff, 0x4000000000000000, 0x8, 0x100, 0xffffffffffffff01, 0x3f, 0x3, 0x7, 0x0, 0x6, 0x4, 0x4, 0x100000000, 0x10001, 0x1, 0x7, 0x9, 0x7, 0x2b, 0x7fff, 0x0, 0x35, 0xb10, 0x0, 0x9a24, 0x7, @perf_bp={&(0x7f0000000100), 0x4}, 0x2000, 0x0, 0x35, 0x0, 0x9, 0x5, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000006280)=""/4096, 0x1000}, {&(0x7f0000007280)=""/10, 0xa}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x9, 0x0, 0x0, 0x1f}, 0x40) sendmsg(r4, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r6}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) sendmsg(r4, &(0x7f0000000200)={&(0x7f0000000040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)="875007cb1951b1d89ec294b581113a7dad0ef163843d7b198ddd78f51d9e88e5f29aecb88e96ba9291fc367382e000cb4b506179c511c947bf803e142947627a6dee66b3c061b30b1fa7dbea532425522e50872bf420", 0x56}], 0x1, &(0x7f00000003c0)=ANY=[]}, 0x40) close(r2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r4, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f0000000940)=""/103, 0x67}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x5, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r4) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000900)={r4, &(0x7f00000005c0)="bf81ee664e2ae680329314dffd23002e6824bc42e36c8f6b942b4e1ff3968052d11c65cbe303fa40248f87cc303a843b7229f88222bdd2f9538a8d3ef7f68e005c086ceb79ce59e00cb23da411e2881e85d34167261929edc42bbf4000c4842e7c204e00", &(0x7f0000000640)="acddd5080bc9b9e0a5eaa569e263721828b26d6e8fa865860510b88a5e1c7e9d1ee8ed04da81ee3a6d7aa1810b630ff940960bb843878b722a053df6c11c55506b7ddfeaa9429f16b1fb652ea26c33711ec68d8b3d0952ded577acf27461cd83967532d0f701e731eccdaf10ecfe97ef63b68f424d7610ff902928d3feaa19fe7bda5ed1b170d2fe9cdb096f4d6386ecbd8edb017b6ba2cd14b5e1868c08ec0499adc8325bfaa5f21af85e5266550622ebd52973dbe19c63040a74b4aba69317af1e5c197156786a7081fc2bcf022fb323b9446f96d25cb2829e40df2174f8", 0x3}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x10, &(0x7f00000003c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0xa12, 0xf, 0xa, 0x0, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r7, 0x4) close(r5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000001c40)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000d80)={0xffffffffffffffff, &(0x7f0000000c00)="eebfb8f7c86aa0deb11a9a66c212f5ba75e633b559e7c293bf776be6df27a0615c9bc9ccf8dacbd5501de4d4d91712ce1aad640ba7c0ee862d6612aec3e68221a150be1acdd1f6d36e3bad26a4c7b143dc07f07b682c277760e5b31796e299813772ee6787b8c00abd334b5344c7cd47b3cb186063fa004a68e735371f21c1250ab294b333153ec23d1571f554a4980be8bfd243e5784af23ba30734ac25db590c9f4600ec831f6accd0815d3bcc99c848dda8c8e3829b1022e9d9494a76cc0999280e7659364b606884e851be2d0ababb565d5009ea35a92b177d777a27f71a13d93d44fdd4f20db576119a150d8cab897706", &(0x7f0000000d00)="e92bf7846f190210202240b446362e8492634a916d2c73702970c4144afd36f6404a1a940266ace3e498154153df147c063afb675c444c99a81ef384d9d1ad2f7d71ca050a527a4a86bd24c2cdfc0935737d821a5623cd2b9b9497198251cc54e7bffff121e018dedac688eab2ed18ab54cb93a15a714bcc"}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={0xffffffffffffffff, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000001700)="0a3d093ba99e981cc0c209304a53b5c156a45b63b9463a36faebf43598c73f9c0d125f633edbaf370fe2f85ec919db432be0164fc7b1f07a4957b1e877c90604a8eb96ac0338e38d28b575f212d5ceefdddccb6868ce4b81a2f024b16b5894a241c6a5cb47c2b8c7f7", 0x69}], 0x1, &(0x7f0000001a00)=ANY=[], 0x0, 0x4}, 0x0) mkdir(&(0x7f0000001cc0)='./file1\x00', 0x10) 2018/03/31 08:42:40 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) socketpair(0x8, 0x7, 0x1, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000900)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) recvmsg(r2, &(0x7f00000007c0)={&(0x7f0000000640)=@rc, 0x80, &(0x7f0000000340)=[{&(0x7f00000006c0)=""/246, 0xf6}], 0x1, 0x0, 0x0, 0x8001}, 0x2) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:40 executing program 2 (fault-call:3 fault-nth:12): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:40 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:40 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x0, &(0x7f0000000580)=ANY=[], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:40 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:40 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x3b7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='ecryptfs\x00', 0x40000, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x10}, 0x10) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x18}, 0xfffffd0a) [ 85.757811] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:40 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:40 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) recvmsg(r3, &(0x7f00000101c0)={&(0x7f000000fcc0)=@can={0x0, 0x0}, 0x80, &(0x7f00000100c0)=[{&(0x7f000000fd40)=""/186, 0xba}, {&(0x7f000000fe00)=""/113, 0x71}, {&(0x7f000000fe80)=""/112, 0x70}, {&(0x7f000000ff00)=""/159, 0x9f}, {&(0x7f000000ffc0)=""/231, 0xe7}], 0x5, &(0x7f0000010140)=""/78, 0x4e, 0x9}, 0x40010001) sendmsg$kcm(r2, &(0x7f00000103c0)={&(0x7f0000010200)=@can={0x1d, r4}, 0x80, &(0x7f0000010380)=[{&(0x7f0000010280)="54b64373cb71f53a3c53f63bd1a2227732ade9260bb0e065647ff702cae566789464abd53610af3f046eb0a5a8", 0x2d}, {&(0x7f00000102c0)="0fb7bb04d002cd22242e2920f8c6e1c1d9b27e8f5d9b9d4ac092b84ab2e6f09ebbad1dbc055b7e133a81c182cadfe8518de47f1af3540283e5c309537a138cc1b4ef902c1d541ba3fbf2a51d4df68d8ff6d59141db5257ae9f6799a6b886026ee61d5b318f7374d2d0bd6bd2606bac2c651f012f29b0722e54f521e9d61714eba062648cc7251c", 0x87}], 0x2, 0x0, 0x0, 0x40}, 0x8000) 2018/03/31 08:42:40 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:40 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:40 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) r5 = getpid() r6 = perf_event_open(&(0x7f00000009c0)={0x3, 0x70, 0x101, 0x9, 0x4, 0xe65, 0x0, 0x9, 0x200, 0x0, 0x5, 0x3, 0x1, 0x4, 0x4, 0x9, 0x3, 0x60, 0x4, 0x4000000, 0x0, 0x3, 0x2, 0x8, 0x80, 0x1, 0x4, 0x485, 0x9, 0x3000000, 0x99, 0x6, 0x6, 0x7, 0xfffffffffffffffd, 0x0, 0x0, 0x5, 0x0, 0xcd, 0x1, @perf_config_ext={0x80000000, 0x87d}, 0x8, 0xf47, 0x4, 0x6, 0x1000, 0x1, 0x4}, r5, 0x3, r3, 0x8) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700)=[{0x78, 0x11, 0x7, "8905c8ef70db7f8f1c344a01dfdc0277157b267957d4f157b7405ea2e8db3bed3729a2d36fb48bcf0d3acd7a9f3b327676cd6d6dccd1bef19a320713339d9637c5f6837ad7b78c51130fba606a0a1dfe5135620cff6acb300d15573a3d5393d3ace45ffa3548"}], 0x78, 0x40000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000280)=0x101) 2018/03/31 08:42:40 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000db80)={&(0x7f000000d700)=@can={0x0, 0x0}, 0x80, &(0x7f000000db00)=[{&(0x7f000000d780)=""/8, 0x8}, {&(0x7f000000d7c0)=""/164, 0xa4}, {&(0x7f000000d880)=""/132, 0x84}, {&(0x7f000000d940)}, {&(0x7f000000d980)=""/44, 0x2c}, {&(0x7f000000d9c0)=""/229, 0xe5}, {&(0x7f000000dac0)}], 0x7, 0x0, 0x0, 0x8}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f000000dbc0)={0xb, 0x15, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x0, 0x3, 0x2, 0x9, 0x9, 0x10, 0x10}, @alu={0x4, 0x3a98, 0xf, 0xa, 0x5, 0xc}, @map={0x18, 0x8, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x34}, @call={0x85, 0x0, 0x0, 0x10}, @exit={0x95}, @generic={0x100000, 0x4, 0xffffffffffff2a1c, 0x9}, @call={0x85, 0x0, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x30}], {0x95}}, &(0x7f0000000300)='GPL\x00', 0x81, 0x1000, &(0x7f0000001940)=""/4096, 0x41100, 0x1, [], r3}, 0x48) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f00000002c0)={r4, r2}) 2018/03/31 08:42:40 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 86.035328] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:40 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:40 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) [ 86.090436] FAULT_INJECTION: forcing a failure. [ 86.090436] name failslab, interval 1, probability 0, space 0, times 0 [ 86.101795] CPU: 0 PID: 9895 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 86.108985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.118340] Call Trace: [ 86.120933] dump_stack+0x194/0x24d [ 86.124572] ? arch_local_irq_restore+0x53/0x53 [ 86.129266] should_fail+0x8c0/0xa40 [ 86.132991] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 86.138097] ? kasan_kmalloc+0xad/0xe0 [ 86.141989] ? kmem_cache_alloc_trace+0x136/0x740 [ 86.146834] ? __memcg_init_list_lru_node+0x169/0x270 [ 86.152023] ? __list_lru_init+0x544/0x750 [ 86.156258] ? sget_userns+0x691/0xe40 [ 86.160147] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 86.164900] ? do_mount+0xea4/0x2bb0 [ 86.168608] ? SyS_mount+0xab/0x120 [ 86.172214] ? do_syscall_64+0x281/0x940 [ 86.176254] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 86.181604] ? find_held_lock+0x35/0x1d0 [ 86.185648] ? __lock_is_held+0xb6/0x140 [ 86.189702] ? check_same_owner+0x320/0x320 [ 86.194010] ? rcu_note_context_switch+0x710/0x710 [ 86.198928] should_failslab+0xec/0x120 [ 86.202886] kmem_cache_alloc_trace+0x4b/0x740 [ 86.207448] ? __kmalloc_node+0x33/0x70 [ 86.211398] ? __kmalloc_node+0x33/0x70 [ 86.215351] ? rcu_read_lock_sched_held+0x108/0x120 [ 86.220350] __memcg_init_list_lru_node+0x169/0x270 [ 86.225347] ? list_lru_add+0x7c0/0x7c0 [ 86.229302] ? __kmalloc_node+0x47/0x70 [ 86.233261] __list_lru_init+0x544/0x750 [ 86.237309] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 86.243175] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 86.248171] ? __lockdep_init_map+0xe4/0x650 [ 86.252561] ? lockdep_init_map+0x9/0x10 [ 86.256604] sget_userns+0x691/0xe40 [ 86.260295] ? kernfs_sop_show_path+0x190/0x190 [ 86.264946] ? kernfs_sop_show_options+0x180/0x180 [ 86.269856] ? destroy_unused_super.part.6+0xd0/0xd0 [ 86.274947] ? check_same_owner+0x320/0x320 [ 86.279249] ? rcu_pm_notify+0xc0/0xc0 [ 86.283123] ? rcu_read_lock_sched_held+0x108/0x120 [ 86.288118] ? kmem_cache_alloc_trace+0x459/0x740 [ 86.292936] ? lock_downgrade+0x980/0x980 [ 86.297069] kernfs_mount_ns+0x13d/0x8b0 [ 86.301114] ? kernfs_super_ns+0x70/0x70 [ 86.305160] sysfs_mount+0xc2/0x1c0 [ 86.308764] ? sysfs_kill_sb+0x40/0x40 [ 86.312631] ? alloc_pages_current+0xbe/0x1e0 [ 86.317109] ? security_sb_copy_data+0x81/0xb0 [ 86.321672] mount_fs+0x66/0x2d0 [ 86.325028] vfs_kern_mount.part.26+0xc6/0x4a0 [ 86.329592] ? may_umount+0xa0/0xa0 [ 86.333196] ? _raw_read_unlock+0x22/0x30 [ 86.337322] ? __get_fs_type+0x8a/0xc0 [ 86.341195] do_mount+0xea4/0x2bb0 [ 86.344722] ? copy_mount_string+0x40/0x40 [ 86.348936] ? rcu_pm_notify+0xc0/0xc0 [ 86.352810] ? copy_mount_options+0x5f/0x2e0 [ 86.357192] ? rcu_read_lock_sched_held+0x108/0x120 [ 86.362186] ? kmem_cache_alloc_trace+0x459/0x740 [ 86.367012] ? kasan_check_write+0x14/0x20 [ 86.371228] ? _copy_from_user+0x99/0x110 [ 86.375357] ? copy_mount_options+0x1f7/0x2e0 [ 86.379832] SyS_mount+0xab/0x120 [ 86.383262] ? copy_mnt_ns+0xb30/0xb30 [ 86.387132] do_syscall_64+0x281/0x940 [ 86.390996] ? vmalloc_sync_all+0x30/0x30 [ 86.395128] ? _raw_spin_unlock_irq+0x27/0x70 [ 86.399601] ? finish_task_switch+0x1c1/0x7e0 [ 86.404077] ? syscall_return_slowpath+0x550/0x550 [ 86.408984] ? syscall_return_slowpath+0x2ac/0x550 [ 86.413896] ? prepare_exit_to_usermode+0x350/0x350 [ 86.418890] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 86.424235] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 86.429061] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 86.434231] RIP: 0033:0x454e79 [ 86.437397] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 86.445088] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 86.452335] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 86.459584] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 86.466831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 86.474080] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c [ 86.585985] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:40 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:40 executing program 4: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000002c0)) r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:40 executing program 2 (fault-call:3 fault-nth:13): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:40 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:40 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:40 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:40 executing program 3: recvmsg(0xffffffffffffff9c, &(0x7f00000006c0)={&(0x7f0000000500)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000580)=""/40, 0x28}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000600)=""/152, 0x98, 0x20}, 0x2) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000740)={r1}) socketpair(0x1b, 0x0, 0x8, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="535e95424db4c94c6a0eed19180de7121fe5430e07b432661b6556d96f5485ff155cbaf134eabc32bc9ec5372e9f62dcea2564d58b7d4b031d89a35560d61c1779f79748008c67c6a62c8b9d2757341b7f182b2d4526038357e33a51ba68bbaa1fd72e5efb2f5dcc0e448ba2a6b11b0143aadb9bc2af661464649cbe7c1d1a6ee5bfc530b01673b0a93f600c36eca0280e9493bfd1b0ee703f5cdfb2a930f1d7b502b635ec07f5d3588fbe9677d3b56ffbeb85e79bbfd56956", 0xb9}], 0x1, &(0x7f0000004800)=ANY=[@ANYBLOB="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"], 0x3410, 0x24000044}, 0x8010) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x80) socketpair(0x1, 0x80005, 0x0, &(0x7f0000000200)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000001380)={&(0x7f0000000100)=@can, 0x80, &(0x7f0000001340)=[{&(0x7f0000001240)=""/234, 0xea}], 0x1}, 0x142) [ 86.704101] FAULT_INJECTION: forcing a failure. [ 86.704101] name failslab, interval 1, probability 0, space 0, times 0 [ 86.715460] CPU: 0 PID: 9934 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 86.722650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.732012] Call Trace: [ 86.734608] dump_stack+0x194/0x24d [ 86.738245] ? arch_local_irq_restore+0x53/0x53 [ 86.742917] should_fail+0x8c0/0xa40 [ 86.746618] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 86.751703] ? kasan_kmalloc+0xad/0xe0 [ 86.755571] ? kmem_cache_alloc_trace+0x136/0x740 [ 86.760396] ? __memcg_init_list_lru_node+0x169/0x270 [ 86.765564] ? __list_lru_init+0x544/0x750 [ 86.769780] ? sget_userns+0x691/0xe40 [ 86.773649] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 86.778387] ? do_mount+0xea4/0x2bb0 [ 86.782079] ? SyS_mount+0xab/0x120 [ 86.785692] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 86.791046] ? find_held_lock+0x35/0x1d0 [ 86.795096] ? __lock_is_held+0xb6/0x140 [ 86.799156] ? check_same_owner+0x320/0x320 [ 86.803467] ? rcu_note_context_switch+0x710/0x710 [ 86.808393] should_failslab+0xec/0x120 [ 86.812352] kmem_cache_alloc_trace+0x4b/0x740 [ 86.816916] ? __kmalloc_node+0x33/0x70 [ 86.820877] ? __kmalloc_node+0x33/0x70 [ 86.824832] ? rcu_read_lock_sched_held+0x108/0x120 [ 86.829840] __memcg_init_list_lru_node+0x169/0x270 [ 86.834843] ? list_lru_add+0x7c0/0x7c0 [ 86.838801] ? __kmalloc_node+0x47/0x70 [ 86.842768] __list_lru_init+0x544/0x750 [ 86.846821] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 86.852697] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 86.857699] ? __lockdep_init_map+0xe4/0x650 [ 86.862094] ? lockdep_init_map+0x9/0x10 [ 86.866142] sget_userns+0x691/0xe40 [ 86.869839] ? kernfs_sop_show_path+0x190/0x190 [ 86.874497] ? kernfs_sop_show_options+0x180/0x180 [ 86.879420] ? destroy_unused_super.part.6+0xd0/0xd0 [ 86.884518] ? check_same_owner+0x320/0x320 [ 86.888825] ? rcu_pm_notify+0xc0/0xc0 [ 86.892712] ? rcu_read_lock_sched_held+0x108/0x120 [ 86.897712] ? kmem_cache_alloc_trace+0x459/0x740 [ 86.902533] ? lock_downgrade+0x980/0x980 [ 86.906676] kernfs_mount_ns+0x13d/0x8b0 [ 86.910722] ? kernfs_super_ns+0x70/0x70 [ 86.914779] sysfs_mount+0xc2/0x1c0 [ 86.918390] ? sysfs_kill_sb+0x40/0x40 [ 86.922262] ? alloc_pages_current+0xbe/0x1e0 [ 86.926745] ? security_sb_copy_data+0x81/0xb0 [ 86.931313] mount_fs+0x66/0x2d0 [ 86.934677] vfs_kern_mount.part.26+0xc6/0x4a0 [ 86.939241] ? may_umount+0xa0/0xa0 [ 86.942858] ? _raw_read_unlock+0x22/0x30 [ 86.946988] ? __get_fs_type+0x8a/0xc0 [ 86.950867] do_mount+0xea4/0x2bb0 [ 86.954398] ? copy_mount_string+0x40/0x40 [ 86.958613] ? rcu_pm_notify+0xc0/0xc0 [ 86.962494] ? copy_mount_options+0x5f/0x2e0 [ 86.966883] ? rcu_read_lock_sched_held+0x108/0x120 [ 86.971883] ? kmem_cache_alloc_trace+0x459/0x740 [ 86.976711] ? kasan_check_write+0x14/0x20 [ 86.980928] ? _copy_from_user+0x99/0x110 [ 86.985064] ? copy_mount_options+0x1f7/0x2e0 [ 86.989546] SyS_mount+0xab/0x120 [ 86.992978] ? copy_mnt_ns+0xb30/0xb30 [ 86.996853] do_syscall_64+0x281/0x940 [ 87.000727] ? vmalloc_sync_all+0x30/0x30 [ 87.004854] ? _raw_spin_unlock_irq+0x27/0x70 [ 87.009335] ? finish_task_switch+0x1c1/0x7e0 [ 87.013813] ? syscall_return_slowpath+0x550/0x550 [ 87.018727] ? syscall_return_slowpath+0x2ac/0x550 [ 87.023638] ? prepare_exit_to_usermode+0x350/0x350 [ 87.028639] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 87.033994] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 87.038832] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 87.044003] RIP: 0033:0x454e79 [ 87.047180] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 08:42:41 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 87.054872] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 87.062122] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 87.069375] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 87.076626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 87.083880] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d 2018/03/31 08:42:41 executing program 4: perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) r1 = gettid() perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xfffffffffffffff8, 0x7fffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1f, 0x8001, 0x8, 0x2, 0x2, 0x10000, 0xffffffff, 0x9, 0x2, 0x10001, 0x6, 0x0, 0x0, 0x9, 0x49b, 0x1, 0x1761, 0x2, 0x2, 0x3, 0x2, 0x0, 0x1, 0x8, 0x0, 0xfffffffffffffffd, 0x0, 0xffffffffffff8001, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xb}, 0x0, 0x9, 0xffff, 0x5, 0x40, 0x5, 0x8}, r1, 0x3, 0xffffffffffffffff, 0x9) socket$kcm(0x29, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x0, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x0, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda0") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r2, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x28}, 0x10) close(0xffffffffffffffff) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r6, 0x4) [ 87.131363] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:41 executing program 2 (fault-call:3 fault-nth:14): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcf}, 0xfffffffffffffd40) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x84, 0x7, 0xffffffff00000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0xa, &(0x7f0000000400)=ANY=[@ANYBLOB="18002000000000000000000000000000000000000020f37b176532826618e8210d55b6b9f796a5cf4309ac945b17b6ec75aad627fce3173f275427d49a02c531c5376326ec3569ef7771eee97cc62f795ee0cac49bf5"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0xfffffe74) mkdir(&(0x7f0000000600)='./file0\x00', 0x10) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='gfs2meta\x00', 0x1114440, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r2, 0x4) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={r1, r3, 0x0, 0x2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='debugfs\x00', 0x1010020, &(0x7f00000003c0)="29c5") socketpair(0x5, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000003080)={&(0x7f0000002c80)=@generic, 0x80, &(0x7f0000003040)=[{&(0x7f0000002d00)=""/229, 0xe5}, {&(0x7f0000002e00)=""/240, 0xf0}, {&(0x7f0000002f00)=""/28, 0x1c}, {&(0x7f0000002f40)=""/240, 0xf0}], 0x4, 0x0, 0x0, 0xad7}, 0x120) recvmsg$kcm(r4, &(0x7f0000002c40)={&(0x7f0000000640)=@ipx, 0x80, &(0x7f0000002ac0)=[{&(0x7f00000006c0)=""/162, 0xa2}, {&(0x7f0000000780)=""/114, 0x72}, {&(0x7f0000000800)=""/56, 0x38}, {&(0x7f0000000840)=""/157, 0x9d}, {&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000002900)=""/152, 0x98}, {&(0x7f00000029c0)=""/200, 0xc8}], 0x8, &(0x7f0000002b40)=""/204, 0xcc, 0x13}, 0x60) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r5}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) 2018/03/31 08:42:41 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a76"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:41 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x0, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) [ 87.287617] FAULT_INJECTION: forcing a failure. [ 87.287617] name failslab, interval 1, probability 0, space 0, times 0 [ 87.298918] CPU: 1 PID: 9965 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 87.306102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.315459] Call Trace: [ 87.318035] dump_stack+0x194/0x24d [ 87.321643] ? arch_local_irq_restore+0x53/0x53 [ 87.326286] ? __save_stack_trace+0x7e/0xd0 [ 87.330591] should_fail+0x8c0/0xa40 [ 87.334284] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 87.339366] ? kasan_kmalloc+0xad/0xe0 [ 87.343228] ? kmem_cache_alloc_trace+0x136/0x740 [ 87.348044] ? __memcg_init_list_lru_node+0x169/0x270 [ 87.353207] ? __list_lru_init+0x544/0x750 [ 87.357418] ? sget_userns+0x691/0xe40 [ 87.361283] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 87.366019] ? do_mount+0xea4/0x2bb0 [ 87.369711] ? SyS_mount+0xab/0x120 [ 87.373316] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 87.378658] ? find_held_lock+0x35/0x1d0 [ 87.382698] ? __lock_is_held+0xb6/0x140 [ 87.386744] ? check_same_owner+0x320/0x320 [ 87.391044] ? rcu_note_context_switch+0x710/0x710 [ 87.395952] should_failslab+0xec/0x120 [ 87.399903] kmem_cache_alloc_trace+0x4b/0x740 [ 87.404457] ? __kmalloc_node+0x33/0x70 [ 87.408404] ? __kmalloc_node+0x33/0x70 [ 87.412356] ? rcu_read_lock_sched_held+0x108/0x120 [ 87.417352] __memcg_init_list_lru_node+0x169/0x270 [ 87.422348] ? list_lru_add+0x7c0/0x7c0 [ 87.426303] ? __kmalloc_node+0x47/0x70 [ 87.430259] __list_lru_init+0x544/0x750 [ 87.434298] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 87.440159] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 87.445151] ? __lockdep_init_map+0xe4/0x650 [ 87.449537] ? lockdep_init_map+0x9/0x10 [ 87.453578] sget_userns+0x691/0xe40 [ 87.457269] ? kernfs_sop_show_path+0x190/0x190 [ 87.461914] ? kernfs_sop_show_options+0x180/0x180 [ 87.466818] ? destroy_unused_super.part.6+0xd0/0xd0 [ 87.471901] ? check_same_owner+0x320/0x320 [ 87.476196] ? rcu_pm_notify+0xc0/0xc0 [ 87.480063] ? rcu_read_lock_sched_held+0x108/0x120 [ 87.485053] ? kmem_cache_alloc_trace+0x459/0x740 [ 87.489868] ? lock_downgrade+0x980/0x980 [ 87.493995] kernfs_mount_ns+0x13d/0x8b0 [ 87.498041] ? kernfs_super_ns+0x70/0x70 [ 87.502083] sysfs_mount+0xc2/0x1c0 [ 87.505684] ? sysfs_kill_sb+0x40/0x40 [ 87.509546] ? alloc_pages_current+0xbe/0x1e0 [ 87.514027] ? security_sb_copy_data+0x81/0xb0 [ 87.518586] mount_fs+0x66/0x2d0 [ 87.521928] vfs_kern_mount.part.26+0xc6/0x4a0 [ 87.526483] ? may_umount+0xa0/0xa0 [ 87.530085] ? _raw_read_unlock+0x22/0x30 [ 87.534206] ? __get_fs_type+0x8a/0xc0 [ 87.538071] do_mount+0xea4/0x2bb0 [ 87.541588] ? copy_mount_string+0x40/0x40 [ 87.545797] ? rcu_pm_notify+0xc0/0xc0 [ 87.549664] ? copy_mount_options+0x5f/0x2e0 [ 87.554047] ? rcu_read_lock_sched_held+0x108/0x120 [ 87.559044] ? kmem_cache_alloc_trace+0x459/0x740 [ 87.563862] ? kasan_check_write+0x14/0x20 [ 87.568075] ? _copy_from_user+0x99/0x110 [ 87.572201] ? copy_mount_options+0x1f7/0x2e0 [ 87.576671] SyS_mount+0xab/0x120 [ 87.580098] ? copy_mnt_ns+0xb30/0xb30 [ 87.583969] do_syscall_64+0x281/0x940 [ 87.587829] ? vmalloc_sync_all+0x30/0x30 [ 87.591950] ? _raw_spin_unlock_irq+0x27/0x70 [ 87.596421] ? finish_task_switch+0x1c1/0x7e0 [ 87.600890] ? syscall_return_slowpath+0x550/0x550 [ 87.605797] ? syscall_return_slowpath+0x2ac/0x550 [ 87.610705] ? prepare_exit_to_usermode+0x350/0x350 [ 87.615699] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 87.621042] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 87.625862] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 87.631036] RIP: 0033:0x454e79 2018/03/31 08:42:42 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 87.634200] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 87.641885] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 87.649129] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 87.656372] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 87.663618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 87.670862] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e 2018/03/31 08:42:42 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x5, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) [ 87.757435] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:42 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:42 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x0, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:42 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a76"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) [ 87.845817] EXT4-fs (sda1): re-mounted. Opts: [ 87.897551] EXT4-fs (sda1): Unrecognized mount option ")Å" or missing value [ 87.978838] 9pnet_virtio: no channels available for device ./file0 [ 87.998836] EXT4-fs (sda1): Unrecognized mount option "ÿÿÿÿÿÿÿÿ" or missing value [ 88.012614] EXT4-fs (sda1): Unrecognized mount option ")Å" or missing value 2018/03/31 08:42:42 executing program 2 (fault-call:3 fault-nth:15): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:42 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xb, 0x5, 0x8, 0x1, 0x4, r1, 0x9}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r2, 0x50, &(0x7f00000002c0)}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:42 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) r3 = perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x0, 0x7ff, 0x92, 0x401, 0x0, 0x6, 0x2, 0xa, 0x5, 0xe3ec, 0x4, 0xffff, 0x100000001, 0x1, 0x8b3c, 0x1ff, 0x3d0, 0x1, 0x80000001, 0x3f, 0x0, 0x8, 0x9, 0x9, 0x2, 0x7d, 0x42e, 0x7fff, 0x2, 0x5, 0x1, 0x0, 0xd87, 0x80000000, 0x49ef, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000080), 0x1}, 0x1803, 0xfffffffffffff1a7, 0x0, 0x6, 0x5, 0x0, 0xffea}, 0x0, 0x4, r0, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xf, 0x2, 0x1f, 0x0, 0x1c, 0xffffffffffffff9c}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', r4}, 0x10) close(r3) socketpair(0x1f, 0x3, 0x9, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000740)={&(0x7f00000006c0)='./file0\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x101, 0x800, 0x3, 0x101, 0x0, 0x2, 0x10040, 0x2, 0x5, 0x4d49, 0x6, 0x200, 0x10000, 0x5, 0x1, 0xfffffffffffff801, 0x0, 0x80000000, 0x162, 0x8000, 0x400, 0x101, 0x93, 0x8000, 0x0, 0x3, 0x200, 0x400, 0x40, 0x10000, 0x8, 0x3, 0x7fffffff, 0x5, 0x1, 0x1f, 0x0, 0x100, 0x0, @perf_bp={&(0x7f00000002c0), 0x9}, 0x20000, 0x9, 0x8, 0x0, 0x2, 0xffffffffffffff5c, 0x6}, r2, 0xa, r1, 0x8) close(r0) mount(&(0x7f0000000400)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)="1d2e366679938d4d7b7abcd0f97a94e5d2d23b6a153b534a8bc0c04b6873662e1b18f1078b077df3e55aeb75dd04d3697d8e7c3850e817cdbd4e15afe488a1fcca6957c1fb7d368664909e10ce5d9c2f25e1d2f4c1a750ffd391b660b387882247f7ab6fe3a4d9035bfd632a4d5dc7c0dae1132ac56fb476ff0245d4e536865ca47a868a1b84624f1f4181401fe82b21a5513cfc1f837a1e08cda5c4ae6d7092d96f8f3e170a6095f3a0fe83d8", 0x20020, &(0x7f0000000500)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb1104058d8843") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) close(r1) socketpair(0x11, 0x6, 0x7fff, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x9, 0xffff, 0x1000, 0x3ff, 0x0, 0xffffffff80000000, 0x40000, 0x8, 0x1000, 0x3, 0x1, 0x4, 0x0, 0x1e64a00000000, 0x8001, 0x6, 0xffffffff, 0x4, 0x6, 0x242, 0x2, 0xa4, 0x8, 0xfff, 0xf77f, 0x401, 0x5727, 0x3, 0x80000000, 0xffffffffffff7fff, 0x6, 0xffffffffffffffa7, 0x8, 0xffffffff7fffffff, 0xff, 0x8, 0x0, 0x4, 0x4, @perf_config_ext={0xade4, 0x5}, 0x10000, 0x8, 0x6, 0x7, 0x2, 0x6, 0x2}, r2, 0x5, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) gettid() ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x5) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r4, 0x28, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r9, 0x35bf5e58, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000600)) 2018/03/31 08:42:42 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x0, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:42 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a76"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:42 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:42 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x5, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) [ 88.155200] FAULT_INJECTION: forcing a failure. [ 88.155200] name failslab, interval 1, probability 0, space 0, times 0 [ 88.166508] CPU: 0 PID: 10037 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 88.173781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.183119] Call Trace: [ 88.185695] dump_stack+0x194/0x24d [ 88.189309] ? arch_local_irq_restore+0x53/0x53 [ 88.193970] should_fail+0x8c0/0xa40 [ 88.197666] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 88.202751] ? kasan_kmalloc+0xad/0xe0 [ 88.206619] ? kmem_cache_alloc_trace+0x136/0x740 [ 88.211442] ? __memcg_init_list_lru_node+0x169/0x270 [ 88.216611] ? __list_lru_init+0x544/0x750 [ 88.220823] ? sget_userns+0x691/0xe40 [ 88.224691] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 88.229425] ? do_mount+0xea4/0x2bb0 [ 88.233116] ? SyS_mount+0xab/0x120 [ 88.236723] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 88.242070] ? find_held_lock+0x35/0x1d0 [ 88.246116] ? __lock_is_held+0xb6/0x140 [ 88.250175] ? check_same_owner+0x320/0x320 [ 88.254479] ? rcu_note_context_switch+0x710/0x710 [ 88.259396] should_failslab+0xec/0x120 [ 88.263354] kmem_cache_alloc_trace+0x4b/0x740 [ 88.267916] ? __kmalloc_node+0x33/0x70 [ 88.271868] ? __kmalloc_node+0x33/0x70 [ 88.275821] ? rcu_read_lock_sched_held+0x108/0x120 [ 88.280822] __memcg_init_list_lru_node+0x169/0x270 [ 88.285821] ? list_lru_add+0x7c0/0x7c0 [ 88.289775] ? __kmalloc_node+0x47/0x70 [ 88.293739] __list_lru_init+0x544/0x750 [ 88.297785] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 88.303652] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 88.308648] ? __lockdep_init_map+0xe4/0x650 [ 88.313039] ? lockdep_init_map+0x9/0x10 [ 88.317084] sget_userns+0x691/0xe40 [ 88.320780] ? kernfs_sop_show_path+0x190/0x190 [ 88.325431] ? kernfs_sop_show_options+0x180/0x180 [ 88.330344] ? destroy_unused_super.part.6+0xd0/0xd0 [ 88.335436] ? check_same_owner+0x320/0x320 [ 88.339741] ? rcu_pm_notify+0xc0/0xc0 [ 88.343619] ? rcu_read_lock_sched_held+0x108/0x120 [ 88.348614] ? kmem_cache_alloc_trace+0x459/0x740 [ 88.353437] ? lock_downgrade+0x980/0x980 [ 88.357577] kernfs_mount_ns+0x13d/0x8b0 [ 88.361624] ? kernfs_super_ns+0x70/0x70 [ 88.365674] sysfs_mount+0xc2/0x1c0 [ 88.369283] ? sysfs_kill_sb+0x40/0x40 [ 88.373150] ? alloc_pages_current+0xbe/0x1e0 [ 88.377628] ? security_sb_copy_data+0x81/0xb0 [ 88.382191] mount_fs+0x66/0x2d0 [ 88.385543] vfs_kern_mount.part.26+0xc6/0x4a0 [ 88.390111] ? may_umount+0xa0/0xa0 [ 88.393719] ? _raw_read_unlock+0x22/0x30 [ 88.397845] ? __get_fs_type+0x8a/0xc0 [ 88.401716] do_mount+0xea4/0x2bb0 [ 88.405241] ? copy_mount_string+0x40/0x40 [ 88.409457] ? rcu_pm_notify+0xc0/0xc0 [ 88.413332] ? copy_mount_options+0x5f/0x2e0 [ 88.417717] ? rcu_read_lock_sched_held+0x108/0x120 [ 88.422714] ? kmem_cache_alloc_trace+0x459/0x740 [ 88.427537] ? kasan_check_write+0x14/0x20 [ 88.431754] ? _copy_from_user+0x99/0x110 [ 88.435887] ? copy_mount_options+0x1f7/0x2e0 [ 88.440364] SyS_mount+0xab/0x120 [ 88.443796] ? copy_mnt_ns+0xb30/0xb30 [ 88.447665] do_syscall_64+0x281/0x940 [ 88.451532] ? vmalloc_sync_all+0x30/0x30 [ 88.455663] ? _raw_spin_unlock_irq+0x27/0x70 [ 88.460140] ? finish_task_switch+0x1c1/0x7e0 [ 88.464617] ? syscall_return_slowpath+0x550/0x550 [ 88.469526] ? syscall_return_slowpath+0x2ac/0x550 [ 88.474438] ? prepare_exit_to_usermode+0x350/0x350 [ 88.479435] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 88.484783] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 88.489611] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 88.494781] RIP: 0033:0x454e79 [ 88.497950] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 88.505641] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 88.512889] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 88.520137] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 88.527386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 88.534633] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f [ 88.560265] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:43 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:43 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:43 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x0, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:43 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x10, 0x800, 0x838e, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000640)={r3, r4}) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000680)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) r6 = getpid() perf_event_open(&(0x7f00000006c0)={0x5, 0x70, 0x400, 0x0, 0xb6, 0x3, 0x0, 0x80000001, 0x0, 0x1, 0x8, 0x9, 0xfffffffffffffff8, 0x7f, 0x81, 0x7, 0x3, 0x100, 0x8001, 0x7, 0x6c6, 0x800, 0x6, 0x7, 0x3, 0x7, 0x20, 0x0, 0xffffffffffffff01, 0x8, 0x5000000, 0x7ff, 0x0, 0x101, 0x4, 0x0, 0xfffffffffffff801, 0xe67, 0x0, 0x1f, 0x2, @perf_config_ext={0x1, 0x1f}, 0x100, 0x8, 0x0, 0x7, 0x6, 0x1ff, 0x7}, r6, 0x0, r4, 0x2) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='ramfs\x00', 0x1088008, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r5, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:43 executing program 3: socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000000)={0xffffffffffffffff}) socketpair(0x1, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000340)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xcf) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000200)=')\x00') socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780)=[{&(0x7f00000003c0)="56232f96f1bbad414692827301a6a7d8651aefea024ccf9b9778e34e81ddb5636235ba4b0c18287cdfde35c44a0379a02f44a0f3497b84a969691c43ea6c45b7860ebbaf4a9e5f6befb7f97100cf2c4e349e8d7b23e4f3366ae3ee9af745ce2013629e8716fe6104066685d653d9b0c3d840ee01e7fcd30b1d662e09ccbeb131c759015b6a83b8c82c5180724388bed49f1311f753264168acd51b9691840949a7bbd73d8279d08e4cc998e74f0310cb9f15731c7ed0f4e640ac18e4e7dff10bae82bafaf2032fd62a", 0xc9}, {&(0x7f0000000540)="63de6fb536e5f6e19d713d254605def0224a1365eaba7ac6f2367a1010bdb22c36a869e023772e0053a47ce6c5", 0x2d}, {&(0x7f00000005c0)="07aa33770abb398a75607c2b75c9e68c318868c8f549362a968344366c3aa3bf63120e9ac8c8f2d45d7907d9aa237ab0d8857fbc3a1ace5977599812ced94edfaf9402b85c04964f8f99cdb9cf54d01991689966e980b1678f75340948e577c75647c4ad372c1f4d7465127b1abcc20ea5a46054f2ee9e5f6ac8a5692fecc697c0f4040443471ec53385b264c7bf71ce94decd733994bcbc9ab9fdb7c8822cf2165af67605c6", 0xa6}, {&(0x7f0000001680)="54235d498bb20941b528ca4ce93986ad9e403cd871627c32c6e79fa3d055f7bcd5667f726665d3985dbf069c7adeb9642c153f7f51b063b100f8250d63c58ecc821a71df9dba1427ec5bbd7e75827bb2dd7986be6a1a4daaaad6d5a3e7d00391d3f3276d45e223578d49d90be5888c5a33bdb7d07f676d4dca8aff6dc9e01756bfd38195e527dbc31b32ffaac05c68374745556be5184cb9efaf20837bd3bdc38254c8b6a193e0da38e9dc464063c621671c9b9c4a3d6977cdea51cb088f87c24b535a0097c9001cf5d477d787c8d637b87b", 0xd2}], 0x4, &(0x7f0000001800)=ANY=[@ANYBLOB="a0000000000000000f0100006c000000de8a7203d90ba10723ab132e6c9259cb14879c298a17072411360708f5704b94ba6b311a696328ee6991ae470d9534766da2112fae367032473c73d59cad729cdf12f194ff8d3513f1df60cd786110d7b27f8e615e27f39cb0b2b1cf5cbde254865d487c06b2580d4b1e893afa99c058095183370ca20053ebace33ea76302d49e7e13f0421e56f0d102282929000000"], 0xa0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000001a00)) mkdir(&(0x7f0000001a40)='./file0/file0\x00', 0x80) recvmsg$kcm(r2, &(0x7f0000001d00)={&(0x7f0000001a80)=@hci={0x0, 0x0}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001b00)=""/143, 0x8f}], 0x1, &(0x7f0000001c00)=""/242, 0xf2, 0x8}, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000001d40)={0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001e00)={0x0, r2, 0x0, 0x1}, 0x14) sendmsg(r5, &(0x7f0000003100)={&(0x7f0000001e40)=@can={0x1d, r4}, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000001ec0)="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", 0x1000}], 0x1, &(0x7f0000002f00)=[{0x48, 0x11f, 0x7, "6de115d74df081f35cf275cc69a616b0934a2d3bdd15717c093ebf56f510d1f3fe771dd5d51b266f43f467ba6701403933ec29e51e9491"}, {0x58, 0x111, 0x1, "d202970119dc4a6ee0d2a473d3385b8dfda6e8b605a1515fe5161ee5ac49092954683b9505ba8547bd93d3dbafd066a14e5973cec7cbadd7ad4aa41da79508eeb95cdf62"}], 0xa0, 0x40}, 0x40000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000003240)={r2, &(0x7f0000003140)="3f2d43ef90eb77469f305ea9a881bd077e1102a8b6fb21e9f3b00cc0ca56e8bd4d650198e5", &(0x7f0000003180)=""/185}, 0x18) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000003280)={0x2, 0x0, [0x0, 0x0]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300), 0x4) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000003400)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000003440)=')\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x6780000000000) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000003480)) 2018/03/31 08:42:43 executing program 2 (fault-call:3 fault-nth:16): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:43 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x5, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) [ 88.747420] 9pnet_virtio: no channels available for device ./file0 [ 88.754743] FAULT_INJECTION: forcing a failure. [ 88.754743] name failslab, interval 1, probability 0, space 0, times 0 [ 88.766067] CPU: 0 PID: 10068 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 88.773344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.782699] Call Trace: [ 88.785299] dump_stack+0x194/0x24d [ 88.788938] ? arch_local_irq_restore+0x53/0x53 [ 88.793628] should_fail+0x8c0/0xa40 [ 88.797354] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 88.802467] ? kasan_kmalloc+0xad/0xe0 [ 88.806364] ? kmem_cache_alloc_trace+0x136/0x740 [ 88.811211] ? __memcg_init_list_lru_node+0x169/0x270 [ 88.816386] ? __list_lru_init+0x544/0x750 [ 88.820604] ? sget_userns+0x691/0xe40 [ 88.824477] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 88.829212] ? do_mount+0xea4/0x2bb0 [ 88.832905] ? SyS_mount+0xab/0x120 [ 88.836516] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 88.841871] ? find_held_lock+0x35/0x1d0 [ 88.845926] ? __lock_is_held+0xb6/0x140 [ 88.849987] ? check_same_owner+0x320/0x320 [ 88.854296] ? rcu_note_context_switch+0x710/0x710 [ 88.859218] should_failslab+0xec/0x120 [ 88.863178] kmem_cache_alloc_trace+0x4b/0x740 [ 88.867752] ? __kmalloc_node+0x33/0x70 [ 88.871710] ? __kmalloc_node+0x33/0x70 [ 88.875666] ? rcu_read_lock_sched_held+0x108/0x120 [ 88.880676] __memcg_init_list_lru_node+0x169/0x270 [ 88.885683] ? list_lru_add+0x7c0/0x7c0 [ 88.889640] ? __kmalloc_node+0x47/0x70 [ 88.893608] __list_lru_init+0x544/0x750 [ 88.897662] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 88.903534] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 88.908538] ? __lockdep_init_map+0xe4/0x650 [ 88.912932] ? lockdep_init_map+0x9/0x10 [ 88.916982] sget_userns+0x691/0xe40 [ 88.920680] ? kernfs_sop_show_path+0x190/0x190 [ 88.925338] ? kernfs_sop_show_options+0x180/0x180 [ 88.930254] ? destroy_unused_super.part.6+0xd0/0xd0 [ 88.935354] ? check_same_owner+0x320/0x320 [ 88.939659] ? rcu_pm_notify+0xc0/0xc0 [ 88.943546] ? rcu_read_lock_sched_held+0x108/0x120 [ 88.948545] ? kmem_cache_alloc_trace+0x459/0x740 [ 88.953368] ? lock_downgrade+0x980/0x980 [ 88.957522] kernfs_mount_ns+0x13d/0x8b0 [ 88.961569] ? kernfs_super_ns+0x70/0x70 [ 88.965628] sysfs_mount+0xc2/0x1c0 [ 88.969237] ? sysfs_kill_sb+0x40/0x40 [ 88.973107] ? alloc_pages_current+0xbe/0x1e0 [ 88.977588] ? security_sb_copy_data+0x81/0xb0 [ 88.982158] mount_fs+0x66/0x2d0 [ 88.985517] vfs_kern_mount.part.26+0xc6/0x4a0 [ 88.990083] ? may_umount+0xa0/0xa0 [ 88.993697] ? _raw_read_unlock+0x22/0x30 [ 88.997828] ? __get_fs_type+0x8a/0xc0 [ 89.001706] do_mount+0xea4/0x2bb0 [ 89.005237] ? copy_mount_string+0x40/0x40 [ 89.009454] ? rcu_pm_notify+0xc0/0xc0 [ 89.013332] ? copy_mount_options+0x5f/0x2e0 [ 89.017721] ? rcu_read_lock_sched_held+0x108/0x120 [ 89.022720] ? kmem_cache_alloc_trace+0x459/0x740 [ 89.027548] ? kasan_check_write+0x14/0x20 [ 89.031773] ? copy_mount_options+0x1f7/0x2e0 [ 89.036254] SyS_mount+0xab/0x120 [ 89.039690] ? copy_mnt_ns+0xb30/0xb30 [ 89.043561] do_syscall_64+0x281/0x940 [ 89.047427] ? vmalloc_sync_all+0x30/0x30 [ 89.051558] ? _raw_spin_unlock_irq+0x27/0x70 [ 89.056044] ? finish_task_switch+0x1c1/0x7e0 [ 89.060523] ? syscall_return_slowpath+0x550/0x550 [ 89.065437] ? syscall_return_slowpath+0x2ac/0x550 [ 89.070351] ? prepare_exit_to_usermode+0x350/0x350 [ 89.075351] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 89.080702] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 89.085538] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 89.090709] RIP: 0033:0x454e79 2018/03/31 08:42:43 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:43 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x0, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:43 executing program 4: r0 = gettid() socketpair(0xa, 0x1, 0x800000000, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x100000001, 0xfffffffffffff001, 0x7, 0xbbe, 0x0, 0x40400000, 0x1, 0xd, 0xee5e, 0xfffffffffffffff9, 0x7fff, 0x0, 0x100000001, 0x4, 0xffffffffffff8001, 0x3, 0x1c, 0x3, 0x1, 0x6, 0xffffffff, 0x7, 0x7, 0x6, 0x7, 0x0, 0x6, 0x1, 0xffff, 0x1f, 0x1, 0x1000, 0x2, 0x9b, 0x1d67, 0x3, 0x0, 0x7f, 0x3, @perf_bp={&(0x7f00000002c0), 0x1}, 0x800, 0x4af, 0xec, 0x3, 0xff, 0x80, 0x6}, r0, 0x3, r1, 0x9) r2 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r2, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r3, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) [ 89.093883] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 89.101574] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 89.108823] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 89.116074] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 89.123324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 89.130581] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 2018/03/31 08:42:43 executing program 2 (fault-call:3 fault-nth:17): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:43 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000007000)={0x0, 0x3, &(0x7f0000009000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000001000)='GPL\x00', 0x0, 0x3d, &(0x7f0000009000)=""/61}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000fd4)={0xe}, 0xd7) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0xf, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x36, 0x0, 0x0, 0x0, 0x8}, [@generic={0x0, 0x2, 0x3, 0x2}, @jmp={0x5, 0x0, 0xc, 0x6, 0xf, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfff}, @call={0x85, 0x0, 0x0, 0x18}, @generic={0x9, 0x6, 0xff, 0x100000000000000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}], {0x95}}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x36, &(0x7f00000000c0)=""/54, 0x41000, 0x1}, 0x48) 2018/03/31 08:42:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:43 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x7, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf88"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) [ 89.258202] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:43 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:43 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:43 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x1f, 0x7, 0x1, 0x709f, 0xe, r1, 0xffffffff}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='ocfs2\x00', 0x804002, &(0x7f0000000640)="25ddbcacf9b4144ff958b9faf6cbe035d21e13a6b2f302df52c12b9c19609919476827ba2df5b2bdcee56ae2310aa13265b99c0c868f2c23d0fa563c3a0cbb00e7220317a0ad1262e390608e1e923bad54d7be9301e8545f79374be0a500a4ffedaa529fd547ed34e9af0da2ad230b31829ddc3d1cba91f9738a82f8c32517f4c62e47709aae00be9c0ef50868f90bf9fee487383f3c4e76e38baa10017bbc1b0688385adec4240b2e5bce9305e7784cb2baffb35014acd0c9686939") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000840)={0x0, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x401, 0x4, 0x0, 0x0, 0x8, 0x0, 0x3, 0x4b2d, 0x7, 0x0, 0xc6a, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000180)}, 0x0, 0x6, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000df9000)='nfs4\x00', 0x0, &(0x7f0000000080)='v') r0 = perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x7, 0xffff, 0x20, 0x7ff, 0x0, 0x2, 0x1000, 0x2, 0x82f, 0xb99c, 0x1, 0x6, 0x3, 0x5, 0x8, 0x10000, 0x3, 0x4, 0x8, 0x401, 0x1, 0x2, 0x7, 0x6, 0x5, 0x0, 0x6, 0xffffffffffffff2e, 0x3, 0x5, 0x1, 0x7fffffff, 0x2, 0xffffffffa3812153, 0x2, 0x5650, 0x0, 0x400, 0x4, @perf_config_ext={0x4, 0xff}, 0x1000, 0x4, 0x9, 0x7, 0x4, 0x5, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000740)) 2018/03/31 08:42:43 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x0, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:43 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 89.458623] NFS: bad mount option value specified: v/file0 [ 89.468480] FAULT_INJECTION: forcing a failure. [ 89.468480] name failslab, interval 1, probability 0, space 0, times 0 [ 89.479795] CPU: 1 PID: 10088 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 89.487062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.496404] Call Trace: [ 89.498983] dump_stack+0x194/0x24d [ 89.502598] ? arch_local_irq_restore+0x53/0x53 [ 89.507243] ? __save_stack_trace+0x7e/0xd0 [ 89.511545] should_fail+0x8c0/0xa40 [ 89.515236] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 89.520314] ? kasan_kmalloc+0xad/0xe0 [ 89.524178] ? kmem_cache_alloc_trace+0x136/0x740 [ 89.528996] ? __memcg_init_list_lru_node+0x169/0x270 [ 89.534166] ? __list_lru_init+0x544/0x750 [ 89.538378] ? sget_userns+0x691/0xe40 [ 89.542241] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 89.546969] ? do_mount+0xea4/0x2bb0 [ 89.550661] ? SyS_mount+0xab/0x120 [ 89.554265] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 89.559606] ? find_held_lock+0x35/0x1d0 [ 89.563644] ? __lock_is_held+0xb6/0x140 [ 89.567687] ? check_same_owner+0x320/0x320 [ 89.571991] ? rcu_note_context_switch+0x710/0x710 [ 89.576903] should_failslab+0xec/0x120 [ 89.580853] kmem_cache_alloc_trace+0x4b/0x740 [ 89.585412] ? __kmalloc_node+0x33/0x70 [ 89.589362] ? __kmalloc_node+0x33/0x70 [ 89.593312] ? rcu_read_lock_sched_held+0x108/0x120 [ 89.598307] __memcg_init_list_lru_node+0x169/0x270 [ 89.603301] ? list_lru_add+0x7c0/0x7c0 [ 89.607250] ? __kmalloc_node+0x47/0x70 [ 89.611205] __list_lru_init+0x544/0x750 [ 89.615244] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 89.621107] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 89.626099] ? __lockdep_init_map+0xe4/0x650 [ 89.630484] ? lockdep_init_map+0x9/0x10 [ 89.634522] sget_userns+0x691/0xe40 [ 89.638209] ? kernfs_sop_show_path+0x190/0x190 [ 89.642860] ? kernfs_sop_show_options+0x180/0x180 [ 89.647763] ? destroy_unused_super.part.6+0xd0/0xd0 [ 89.652846] ? check_same_owner+0x320/0x320 [ 89.657142] ? rcu_pm_notify+0xc0/0xc0 [ 89.661017] ? rcu_read_lock_sched_held+0x108/0x120 [ 89.666017] ? kmem_cache_alloc_trace+0x459/0x740 [ 89.670835] ? lock_downgrade+0x980/0x980 [ 89.674966] kernfs_mount_ns+0x13d/0x8b0 [ 89.679003] ? kernfs_super_ns+0x70/0x70 [ 89.683049] sysfs_mount+0xc2/0x1c0 [ 89.686652] ? sysfs_kill_sb+0x40/0x40 [ 89.690515] ? alloc_pages_current+0xbe/0x1e0 [ 89.694986] ? security_sb_copy_data+0x81/0xb0 [ 89.699549] mount_fs+0x66/0x2d0 [ 89.702895] vfs_kern_mount.part.26+0xc6/0x4a0 [ 89.707451] ? may_umount+0xa0/0xa0 [ 89.711055] ? _raw_read_unlock+0x22/0x30 [ 89.715180] ? __get_fs_type+0x8a/0xc0 [ 89.719045] do_mount+0xea4/0x2bb0 [ 89.722565] ? copy_mount_string+0x40/0x40 [ 89.726774] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 89.731766] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 89.736504] ? retint_kernel+0x10/0x10 [ 89.740373] ? copy_mount_options+0x18b/0x2e0 [ 89.744843] ? audit_kill_trees+0x430/0x430 [ 89.749142] ? copy_mount_options+0x1f7/0x2e0 [ 89.753614] SyS_mount+0xab/0x120 [ 89.757040] ? copy_mnt_ns+0xb30/0xb30 [ 89.760901] do_syscall_64+0x281/0x940 [ 89.764761] ? vmalloc_sync_all+0x30/0x30 [ 89.768882] ? _raw_spin_unlock_irq+0x27/0x70 [ 89.773351] ? finish_task_switch+0x1c1/0x7e0 [ 89.777821] ? syscall_return_slowpath+0x550/0x550 [ 89.782723] ? syscall_return_slowpath+0x2ac/0x550 [ 89.787629] ? prepare_exit_to_usermode+0x350/0x350 [ 89.792622] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 89.797965] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 89.802784] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 89.807946] RIP: 0033:0x454e79 [ 89.811113] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 89.818795] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 89.826041] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 89.833284] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 89.840531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 89.847773] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 [ 89.857946] NFS: bad mount option value specified: v/file0 [ 89.884162] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:44 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x7, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf88"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:44 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = gettid() r2 = perf_event_open(&(0x7f00000022c0)={0x2, 0x70, 0x100, 0x1000, 0x140000000000000, 0x4800000000000, 0x0, 0x4, 0xa210, 0x2, 0x1, 0x3, 0xfffffffffffffff5, 0x2, 0x100, 0xf1d1, 0xffff, 0xfb, 0x6, 0x9, 0x50, 0x9, 0x80, 0x0, 0x137ece70, 0x4, 0x8001, 0x1, 0x5, 0x9e, 0x7, 0xbb, 0x9, 0xa1a1, 0x1, 0x7, 0x7fffffff, 0x2059, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x1}, 0x10008, 0x100000001, 0x7ff, 0x7, 0x7, 0x9, 0x22000000}, 0x0, 0x6, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3, 0x5, 0xffff, 0x2, 0x0, 0xfffffffffffffffe, 0x4, 0x6, 0x800, 0x3, 0x280, 0x0, 0x2, 0x9c, 0x5, 0x1, 0x100000000, 0x81, 0x14dfb2b1, 0x1, 0x6, 0xffff, 0x400, 0x3, 0x5, 0x200, 0x69b, 0xa000000000, 0x0, 0x101, 0x100000001, 0x2, 0x200, 0x8, 0xd0a4, 0x7, 0x0, 0xc3, 0x4, @perf_bp={&(0x7f0000000300), 0x4}, 0x200c, 0x7, 0xfff, 0x7, 0x2fe, 0x5, 0x6}, r1, 0xc, r2, 0x2) recvmsg(r0, &(0x7f0000002100)={&(0x7f0000000ac0)=@in={0x0, 0x0, @rand_addr}, 0x80, &(0x7f0000002000)=[{&(0x7f0000000b40)=""/172, 0xac}, {&(0x7f0000000a40)=""/14, 0xe}, {&(0x7f0000000c00)=""/99, 0x63}, {&(0x7f0000000c80)=""/4096, 0x1000}, {&(0x7f0000001c80)=""/242, 0xf2}, {&(0x7f0000001d80)=""/90, 0x5a}, {&(0x7f0000001e00)=""/231, 0xe7}, {&(0x7f0000001f00)=""/37, 0x25}, {&(0x7f0000001f40)=""/190, 0xbe}], 0x9, &(0x7f00000020c0)=""/37, 0x25, 0xffffffff00000001}, 0x2) mkdir(&(0x7f0000ac6000)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x0, 0x100000000, 0x7, 0x14, 0xffffffffffffffff, 0xfff}, 0x2c) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000002c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0/file0\x00', r3}, 0x10) socketpair$inet6(0xa, 0x0, 0x8000, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='securityfs\x00', 0x0, &(0x7f0000000200)) mkdir(&(0x7f0000000a80)='./file0/file0\x00', 0x0) sendmsg$kcm(r4, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000200)="79482b62af385a84d85b8fd7f0045b45ee92b98ec419cc51629bdda1ad64138c366aa6ae858d9ebfdea969415c73e6a27ecf87115b83b66f652cc6589d02d80f1a48242eca6baca702a488cf3963ba85b8c99a870164478e4c3853e959ed5c0e9cf5478511603659b3f487305e7823e5f6a01ea772", 0x75}, {&(0x7f0000002200)="b39660e8b92666f145f56ad1a2b33ccad637ad9dbbf3eb6e13efa29059398160f0bc6dff8ae53f9361adf75e6dd448540a2f4261034bf80935dcc60bfb47115804b98ab600b9e530075253aa568763eaf5a89ff89b16f90eaaaf62c2d450b8066745793c58c6a439ad7499a3f53d7bec51dfa656e4658ca00e221dfbc8d378a49cced1f4b595c62f21718ed9e77faab0ba5f9db24f8c2117b01017b6cb9a61c1f385a1cadda36d319f", 0xa9}, {&(0x7f0000000340)="7424dfafb7dd1efc4abb546815c17e", 0xf}, {&(0x7f0000002140)="02ca617401cf642bf226086477beafbf59ca36c6b06c51127d6e3fe89445b36202a016ce7c4a9ce1d2684ea3dcddf3cb37d50f26c687732f418d724fb62f18fb2976b1c2c89577fffede2657bd250c57e894ac90787aee6304118d4f0804ad0f346dfab4385209c68bfc233199d183cfc8f674fd0ecdef367ca8a89a973bfbbecbf1b53819", 0x85}, {&(0x7f0000000440)="8a9f69a5bd0cff74d70a06e275d3ce5efc9eade2a9688edeb7ea3c82a19a63bced645c078c195ce25b824bc28a01bfa73454402a143073bc82cef0909a7722fd5ce74c882c5b01e2b0d9550438c1d3a6c76093650b39fbd38e4c2b8fdc756cb7f46c34969c3e01c4aafdb75392025aa499c77081a5fa040a6b4fcbfdff15be415ca66434cfb2deda2d0e0e64c768c9492abd92bf738e9a10dec75a399b4125197ec1b1e6b562dc7115113afb9aa6d8d974d2d6c493916f96", 0xb8}, {&(0x7f0000000500)="51a16189626415dca6a0ff8621d6c681b61471a072feb85c72c4c9d68cac1eb26b4a1cf5a441460106e99d6a5029dbda9f1aa1b7dcdad900eeb6a9e9636b0ad12d3d03494721d88f6905b7368c8381cf2b270fec0da0e8e9188d8ab4ac1e1b4914b0960b33b71723049f279fd35f816a270758d9470078e04fca1b7cbbec3c9403abb2466fbf321993d48cc228d22957", 0x90}], 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x3c0, 0x8000}, 0x0) 2018/03/31 08:42:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x0, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:44 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:44 executing program 2 (fault-call:3 fault-nth:18): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:44 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:44 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r2, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x15f) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0xb8f, 0xffffffffffff0001, 0x40, 0xc9, 0x0, 0x7f, 0x81000, 0x2, 0x1, 0xfffffffffffffffc, 0x5, 0x8, 0x2, 0x7886, 0x3, 0x778b, 0x3, 0x1000, 0x1, 0xdf, 0x1, 0x80000000, 0x4, 0xfff, 0x8, 0x8, 0x9, 0xffffffff, 0x400, 0x9, 0x2, 0xbce, 0x0, 0xfffffffffffffb32, 0x5, 0xffff, 0x0, 0x78af, 0x0, @perf_bp={&(0x7f0000000340), 0x8}, 0x1104, 0x1, 0x1, 0x3, 0x4845, 0x1, 0xfffffffffffffffc}, r3, 0x4, r1, 0x3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000004c0)={r1}) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:44 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) [ 90.087604] FAULT_INJECTION: forcing a failure. [ 90.087604] name failslab, interval 1, probability 0, space 0, times 0 [ 90.099054] CPU: 0 PID: 10150 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 90.106334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.115691] Call Trace: [ 90.118282] dump_stack+0x194/0x24d [ 90.121927] ? arch_local_irq_restore+0x53/0x53 [ 90.126629] should_fail+0x8c0/0xa40 [ 90.130339] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 90.135424] ? kasan_kmalloc+0xad/0xe0 [ 90.139297] ? kmem_cache_alloc_trace+0x136/0x740 [ 90.144117] ? __memcg_init_list_lru_node+0x169/0x270 [ 90.149284] ? __list_lru_init+0x544/0x750 [ 90.153498] ? sget_userns+0x691/0xe40 [ 90.157369] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 90.162102] ? do_mount+0xea4/0x2bb0 [ 90.165795] ? SyS_mount+0xab/0x120 [ 90.169402] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 90.174753] ? find_held_lock+0x35/0x1d0 [ 90.178802] ? __lock_is_held+0xb6/0x140 [ 90.182855] ? check_same_owner+0x320/0x320 [ 90.187161] ? rcu_note_context_switch+0x710/0x710 [ 90.192079] should_failslab+0xec/0x120 [ 90.196040] kmem_cache_alloc_trace+0x4b/0x740 [ 90.200604] ? __kmalloc_node+0x33/0x70 [ 90.204557] ? __kmalloc_node+0x33/0x70 [ 90.208514] ? rcu_read_lock_sched_held+0x108/0x120 [ 90.213513] __memcg_init_list_lru_node+0x169/0x270 [ 90.218516] ? list_lru_add+0x7c0/0x7c0 [ 90.222477] ? __kmalloc_node+0x47/0x70 [ 90.226447] __list_lru_init+0x544/0x750 [ 90.230496] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 90.236364] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 90.241362] ? __lockdep_init_map+0xe4/0x650 [ 90.245754] ? lockdep_init_map+0x9/0x10 [ 90.249800] sget_userns+0x691/0xe40 [ 90.253756] ? kernfs_sop_show_path+0x190/0x190 [ 90.258408] ? kernfs_sop_show_options+0x180/0x180 [ 90.263324] ? destroy_unused_super.part.6+0xd0/0xd0 [ 90.268414] ? check_same_owner+0x320/0x320 [ 90.272721] ? rcu_pm_notify+0xc0/0xc0 [ 90.276600] ? rcu_read_lock_sched_held+0x108/0x120 [ 90.281595] ? kmem_cache_alloc_trace+0x459/0x740 [ 90.286413] ? lock_downgrade+0x980/0x980 [ 90.290555] kernfs_mount_ns+0x13d/0x8b0 [ 90.294602] ? kernfs_super_ns+0x70/0x70 [ 90.298656] sysfs_mount+0xc2/0x1c0 [ 90.302261] ? sysfs_kill_sb+0x40/0x40 [ 90.306128] ? alloc_pages_current+0xbe/0x1e0 [ 90.310607] ? security_sb_copy_data+0x81/0xb0 [ 90.315169] mount_fs+0x66/0x2d0 [ 90.318521] vfs_kern_mount.part.26+0xc6/0x4a0 [ 90.323082] ? may_umount+0xa0/0xa0 [ 90.326688] ? _raw_read_unlock+0x22/0x30 [ 90.330817] ? __get_fs_type+0x8a/0xc0 [ 90.334692] do_mount+0xea4/0x2bb0 [ 90.338217] ? copy_mount_string+0x40/0x40 [ 90.342434] ? rcu_pm_notify+0xc0/0xc0 [ 90.346310] ? copy_mount_options+0x5f/0x2e0 [ 90.350699] ? rcu_read_lock_sched_held+0x108/0x120 [ 90.355695] ? kmem_cache_alloc_trace+0x459/0x740 [ 90.360520] ? kasan_check_write+0x14/0x20 [ 90.364736] ? _copy_from_user+0x99/0x110 [ 90.368868] ? copy_mount_options+0x1f7/0x2e0 [ 90.373348] SyS_mount+0xab/0x120 [ 90.376778] ? copy_mnt_ns+0xb30/0xb30 [ 90.380650] do_syscall_64+0x281/0x940 [ 90.384516] ? vmalloc_sync_all+0x30/0x30 [ 90.388642] ? _raw_spin_unlock_irq+0x27/0x70 [ 90.393120] ? finish_task_switch+0x1c1/0x7e0 [ 90.397596] ? syscall_return_slowpath+0x550/0x550 [ 90.402505] ? syscall_return_slowpath+0x2ac/0x550 [ 90.407417] ? prepare_exit_to_usermode+0x350/0x350 [ 90.412415] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 90.417764] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 90.422593] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 90.427760] RIP: 0033:0x454e79 [ 90.430928] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 08:42:44 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:44 executing program 3: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000e91000)={0x0, 0xffffffffffffff66, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) recvmsg(r0, &(0x7f0000002240)={&(0x7f00000000c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000440)=""/69, 0x45}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000002300)) 2018/03/31 08:42:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x0, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) [ 90.438619] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 90.445866] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 90.453145] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 90.460395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 90.467644] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 2018/03/31 08:42:44 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:44 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x7, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf88"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:44 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:44 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f00000002c0)={r4, r3}) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={0x0, r2, 0x6, 0x2}, 0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$ax25(0x3, 0x3, 0xcb, &(0x7f0000000100)) socketpair$inet_sctp(0x2, 0x4400000001, 0x84, &(0x7f0000000300)) [ 90.534589] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:44 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:44 executing program 2 (fault-call:3 fault-nth:19): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) [ 90.718945] 9pnet_virtio: no channels available for device ./file0 [ 90.721698] FAULT_INJECTION: forcing a failure. [ 90.721698] name failslab, interval 1, probability 0, space 0, times 0 [ 90.736707] CPU: 0 PID: 10191 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 90.743982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.753334] Call Trace: [ 90.755934] dump_stack+0x194/0x24d [ 90.759571] ? arch_local_irq_restore+0x53/0x53 [ 90.764267] should_fail+0x8c0/0xa40 2018/03/31 08:42:45 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:45 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) [ 90.767994] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 90.773108] ? kasan_kmalloc+0xad/0xe0 [ 90.776999] ? kmem_cache_alloc_trace+0x136/0x740 [ 90.781844] ? __memcg_init_list_lru_node+0x169/0x270 [ 90.787039] ? __list_lru_init+0x544/0x750 [ 90.791284] ? sget_userns+0x691/0xe40 [ 90.795179] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 90.799943] ? do_mount+0xea4/0x2bb0 [ 90.803662] ? SyS_mount+0xab/0x120 [ 90.807291] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 90.812649] ? find_held_lock+0x35/0x1d0 [ 90.816702] ? __lock_is_held+0xb6/0x140 [ 90.820764] ? check_same_owner+0x320/0x320 [ 90.825080] ? rcu_note_context_switch+0x710/0x710 [ 90.829999] should_failslab+0xec/0x120 [ 90.833960] kmem_cache_alloc_trace+0x4b/0x740 [ 90.838519] ? __kmalloc_node+0x33/0x70 [ 90.842472] ? __kmalloc_node+0x33/0x70 [ 90.846427] ? rcu_read_lock_sched_held+0x108/0x120 [ 90.851427] __memcg_init_list_lru_node+0x169/0x270 [ 90.856429] ? list_lru_add+0x7c0/0x7c0 [ 90.860389] ? __kmalloc_node+0x47/0x70 [ 90.864352] __list_lru_init+0x544/0x750 [ 90.868402] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 90.874270] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 90.879267] ? __lockdep_init_map+0xe4/0x650 [ 90.883655] ? lockdep_init_map+0x9/0x10 [ 90.887700] sget_userns+0x691/0xe40 [ 90.891399] ? kernfs_sop_show_path+0x190/0x190 [ 90.896052] ? kernfs_sop_show_options+0x180/0x180 [ 90.900963] ? destroy_unused_super.part.6+0xd0/0xd0 [ 90.906059] ? check_same_owner+0x320/0x320 [ 90.910361] ? rcu_pm_notify+0xc0/0xc0 [ 90.914240] ? rcu_read_lock_sched_held+0x108/0x120 [ 90.919233] ? kmem_cache_alloc_trace+0x459/0x740 [ 90.924054] ? lock_downgrade+0x980/0x980 [ 90.928192] kernfs_mount_ns+0x13d/0x8b0 [ 90.932235] ? kernfs_super_ns+0x70/0x70 [ 90.936286] sysfs_mount+0xc2/0x1c0 [ 90.939894] ? sysfs_kill_sb+0x40/0x40 [ 90.943760] ? alloc_pages_current+0xbe/0x1e0 [ 90.948237] ? security_sb_copy_data+0x81/0xb0 [ 90.952802] mount_fs+0x66/0x2d0 [ 90.956154] vfs_kern_mount.part.26+0xc6/0x4a0 [ 90.960715] ? may_umount+0xa0/0xa0 [ 90.964321] ? _raw_read_unlock+0x22/0x30 [ 90.968448] ? __get_fs_type+0x8a/0xc0 [ 90.972320] do_mount+0xea4/0x2bb0 [ 90.975845] ? copy_mount_string+0x40/0x40 [ 90.980057] ? rcu_pm_notify+0xc0/0xc0 [ 90.983933] ? copy_mount_options+0x5f/0x2e0 [ 90.988318] ? rcu_read_lock_sched_held+0x108/0x120 [ 90.993312] ? kmem_cache_alloc_trace+0x459/0x740 [ 90.998135] ? kasan_check_write+0x14/0x20 [ 91.002348] ? _copy_from_user+0x99/0x110 [ 91.006484] ? copy_mount_options+0x1f7/0x2e0 [ 91.010960] SyS_mount+0xab/0x120 [ 91.014394] ? copy_mnt_ns+0xb30/0xb30 [ 91.018264] do_syscall_64+0x281/0x940 [ 91.022132] ? vmalloc_sync_all+0x30/0x30 [ 91.026258] ? _raw_spin_unlock_irq+0x27/0x70 [ 91.030734] ? finish_task_switch+0x1c1/0x7e0 [ 91.035208] ? syscall_return_slowpath+0x550/0x550 [ 91.040116] ? syscall_return_slowpath+0x2ac/0x550 [ 91.045031] ? prepare_exit_to_usermode+0x350/0x350 [ 91.050034] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 91.055384] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 91.060213] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 91.065387] RIP: 0033:0x454e79 2018/03/31 08:42:45 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) [ 91.068554] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 91.076244] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 91.083492] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 91.090741] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 91.097988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 91.105240] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 2018/03/31 08:42:45 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:45 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 91.175264] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:45 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000010c0)={&(0x7f0000000c00)=@hci={0x0, 0x0}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000c80)=""/119, 0x77}, {&(0x7f0000000d00)=""/76, 0x4c}, {&(0x7f0000000d80)=""/199, 0xc7}, {&(0x7f0000002940)=""/4096, 0x1000}, {&(0x7f0000000e80)=""/78, 0x4e}, {&(0x7f0000000f00)=""/8, 0x8}, {&(0x7f0000000f40)=""/158, 0x9e}], 0x7, 0x0, 0x0, 0x9}, 0x21) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0xf, 0xe, &(0x7f00000002c0)=@raw=[@generic={0x6, 0x7f800, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1}, @generic={0x200, 0x3, 0x800, 0xb8f}, @initr0={0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x10000}, @alu={0x7, 0x1, 0x5, 0x5, 0xf, 0xe, 0xfffffffffffffff0}, @generic={0x2, 0xffff, 0xfffffffffffff440, 0x96}, @generic={0x1f, 0x800, 0x7, 0x8}], &(0x7f0000000080)='syzkaller\x00', 0xf1, 0xd7, &(0x7f0000000640)=""/215, 0x41f00, 0x1, [], r2}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r4, &(0x7f0000000300), &(0x7f0000000740)="8c1a7fd3083917c92b203c212e8766cf565154709a63b970f63fb9fbd1b8a0038bca2f0ced98efcde12913389b1ac173caf3d98ea6c8c973a7b5303c53bae5a0f6abae59fa07faa476000200000000000067c58eb7b045b2f08fa920c34fc86506ed44d85f3dee8e38925cf7ea00f1b32a3abac97adbd29982f48b156e0cf4428d750a8aa44bb58dee78f58088411f4a6d414d3ab108c53b5069dc28739d8155bae03b1c3ef782cad37de3fed8be6b9da35146305fd8d6746762a65bd0ac95003b4aca0e179d29b44406f15e71bfad9cbf4a", 0x3}, 0x1a) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000880)={&(0x7f0000000840)='./file0/file0\x00', r3}, 0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:45 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:45 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) [ 91.379927] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:45 executing program 3: socketpair(0x2, 0x1, 0xfffffffffffffffc, &(0x7f0000000040)) 2018/03/31 08:42:45 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:45 executing program 2 (fault-call:3 fault-nth:20): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:45 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:45 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:45 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:45 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x0, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:45 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) socketpair(0x17, 0x1, 0x607, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r2, &(0x7f0000000e00)={&(0x7f0000000a40)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000ac0)=""/133, 0x85}, {&(0x7f0000000b80)=""/167, 0xa7}, {&(0x7f0000000c40)=""/93, 0x5d}, {&(0x7f0000000cc0)=""/30, 0x1e}, {&(0x7f0000000d00)}, {&(0x7f0000000d40)=""/38, 0x26}], 0x6, 0x0, 0x0, 0x5}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000002c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r2, &(0x7f0000000640)="9a480a37e6d7a6ab785454f9303201fdb67aa86fbcfd285ddf706eecbd7169d8d33ceded3ec9c85b53593110016c40df377c05ed95af0ea1374cbfe7ddb81f02c79708310a904e640269ec8b19d95408dd83fda9f7ea8d9e4b582b5de0898746f56fa35d2e3da3f824e496034ef9c4a00aeae81cf71b046ae5005768f29fe46ad80991920e5262f12e92131e870e42be05c1de49fe14b91a5222d8826f45d07c35577cb37db254888a73d8744ee02fdd5909cd0c38a7ac36129b49b1eac267c1088c590acbeec8558a8be5ee34665339bf9e7b9917aeaa1701bcd29e3c68905881ac63", &(0x7f0000000740)=""/199}, 0x18) [ 91.588012] FAULT_INJECTION: forcing a failure. [ 91.588012] name failslab, interval 1, probability 0, space 0, times 0 [ 91.599400] CPU: 0 PID: 10253 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 91.606681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.616036] Call Trace: [ 91.618632] dump_stack+0x194/0x24d [ 91.622275] ? arch_local_irq_restore+0x53/0x53 [ 91.626965] should_fail+0x8c0/0xa40 [ 91.630693] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 91.633115] 9pnet_virtio: no channels available for device ./file0 [ 91.635795] ? kasan_kmalloc+0xad/0xe0 [ 91.635809] ? kmem_cache_alloc_trace+0x136/0x740 [ 91.635821] ? __memcg_init_list_lru_node+0x169/0x270 [ 91.635830] ? __list_lru_init+0x544/0x750 [ 91.635840] ? sget_userns+0x691/0xe40 [ 91.635853] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 91.635863] ? do_mount+0xea4/0x2bb0 [ 91.672573] ? SyS_mount+0xab/0x120 [ 91.676203] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 91.681592] ? find_held_lock+0x35/0x1d0 [ 91.685673] ? __lock_is_held+0xb6/0x140 [ 91.689765] ? check_same_owner+0x320/0x320 [ 91.694109] ? rcu_note_context_switch+0x710/0x710 [ 91.699052] should_failslab+0xec/0x120 [ 91.703031] kmem_cache_alloc_trace+0x4b/0x740 [ 91.707597] ? __kmalloc_node+0x33/0x70 [ 91.711554] ? __kmalloc_node+0x33/0x70 [ 91.715511] ? rcu_read_lock_sched_held+0x108/0x120 [ 91.720514] __memcg_init_list_lru_node+0x169/0x270 [ 91.725513] ? list_lru_add+0x7c0/0x7c0 [ 91.729467] ? __kmalloc_node+0x47/0x70 [ 91.733429] __list_lru_init+0x544/0x750 [ 91.737474] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 91.743340] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 91.748338] ? __lockdep_init_map+0xe4/0x650 [ 91.752730] ? lockdep_init_map+0x9/0x10 [ 91.756773] sget_userns+0x691/0xe40 [ 91.760466] ? kernfs_sop_show_path+0x190/0x190 [ 91.765119] ? kernfs_sop_show_options+0x180/0x180 [ 91.770033] ? destroy_unused_super.part.6+0xd0/0xd0 [ 91.775128] ? check_same_owner+0x320/0x320 [ 91.779430] ? rcu_pm_notify+0xc0/0xc0 [ 91.783309] ? rcu_read_lock_sched_held+0x108/0x120 [ 91.788309] ? kmem_cache_alloc_trace+0x459/0x740 [ 91.793155] ? lock_downgrade+0x980/0x980 [ 91.797291] kernfs_mount_ns+0x13d/0x8b0 [ 91.801342] ? kernfs_super_ns+0x70/0x70 [ 91.805395] sysfs_mount+0xc2/0x1c0 [ 91.809001] ? sysfs_kill_sb+0x40/0x40 [ 91.812876] ? alloc_pages_current+0xbe/0x1e0 [ 91.817353] ? security_sb_copy_data+0x81/0xb0 [ 91.821919] mount_fs+0x66/0x2d0 [ 91.825270] vfs_kern_mount.part.26+0xc6/0x4a0 [ 91.829832] ? may_umount+0xa0/0xa0 [ 91.833439] ? _raw_read_unlock+0x22/0x30 [ 91.837570] ? __get_fs_type+0x8a/0xc0 [ 91.841444] do_mount+0xea4/0x2bb0 [ 91.844972] ? copy_mount_string+0x40/0x40 [ 91.849184] ? rcu_pm_notify+0xc0/0xc0 [ 91.853061] ? copy_mount_options+0x5f/0x2e0 [ 91.857450] ? rcu_read_lock_sched_held+0x108/0x120 [ 91.862444] ? kmem_cache_alloc_trace+0x459/0x740 [ 91.867267] ? kasan_check_write+0x14/0x20 [ 91.871485] ? _copy_from_user+0x99/0x110 [ 91.875617] ? copy_mount_options+0x1f7/0x2e0 [ 91.880094] SyS_mount+0xab/0x120 [ 91.883524] ? copy_mnt_ns+0xb30/0xb30 [ 91.887395] do_syscall_64+0x281/0x940 [ 91.891263] ? vmalloc_sync_all+0x30/0x30 [ 91.895392] ? _raw_spin_unlock_irq+0x27/0x70 [ 91.899865] ? finish_task_switch+0x1c1/0x7e0 [ 91.904343] ? syscall_return_slowpath+0x550/0x550 [ 91.909252] ? syscall_return_slowpath+0x2ac/0x550 [ 91.914163] ? prepare_exit_to_usermode+0x350/0x350 [ 91.919160] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 91.924507] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 91.929336] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 91.934504] RIP: 0033:0x454e79 [ 91.937672] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 91.945379] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 91.952627] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 91.959874] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 91.967123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 91.974370] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 2018/03/31 08:42:46 executing program 3: mkdir(&(0x7f0000024000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f000013b000)={0x0, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005040)={&(0x7f0000004f00)=@hci={0x0, 0x0}, 0x80, &(0x7f0000005000)=[{&(0x7f0000004f80)=""/91, 0x5b}], 0x1, 0x0, 0x0, 0x39a4}, 0x140) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3, 0xfa, 0x7, 0x80000001, 0x0, 0x4, 0x2102, 0x2, 0x7edd, 0x1b, 0x68, 0x0, 0x1237c456, 0x70, 0x7, 0x1, 0xfffffffffffffffb, 0x68f, 0x8000, 0x1, 0x7, 0x7, 0x1, 0x7, 0x80000001, 0x7, 0x6, 0x7ff, 0xffffffffffffff00, 0xd1, 0x10000, 0x6, 0x9, 0x0, 0x8001, 0x5000000000000000, 0x0, 0x100, 0x7, @perf_bp={&(0x7f0000000000), 0x8}, 0x400, 0x7ff, 0x2, 0x7, 0x100000001, 0x79a, 0x6}, 0x0, 0x10, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2) socketpair$ax25(0x3, 0x7, 0xcb, &(0x7f0000000100)) socketpair$inet6(0xa, 0x1, 0x400, &(0x7f00000000c0)) sendmsg(r0, &(0x7f0000b5bfc8)={&(0x7f00009c3ff6)=@hci={0x1f, r2, 0x3}, 0x80, &(0x7f0000042000), 0x0, &(0x7f0000641a38)}, 0x0) 2018/03/31 08:42:46 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x11, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:46 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00000002c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:46 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:46 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:46 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:46 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:46 executing program 2 (fault-call:3 fault-nth:21): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) [ 92.148451] FAULT_INJECTION: forcing a failure. [ 92.148451] name failslab, interval 1, probability 0, space 0, times 0 [ 92.159762] CPU: 1 PID: 10286 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 92.167037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.176378] Call Trace: [ 92.178951] dump_stack+0x194/0x24d [ 92.182568] ? arch_local_irq_restore+0x53/0x53 [ 92.187221] should_fail+0x8c0/0xa40 [ 92.190917] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 92.195999] ? trace_event_raw_event_lock+0x340/0x340 [ 92.201173] ? trace_hardirqs_off+0x10/0x10 [ 92.205469] ? lock_downgrade+0x980/0x980 [ 92.209593] ? trace_hardirqs_off+0x10/0x10 [ 92.213893] ? find_held_lock+0x35/0x1d0 [ 92.217935] ? __lock_is_held+0xb6/0x140 [ 92.221980] ? check_same_owner+0x320/0x320 [ 92.226277] ? rcu_note_context_switch+0x710/0x710 [ 92.231183] ? rcu_note_context_switch+0x710/0x710 [ 92.236093] should_failslab+0xec/0x120 [ 92.240048] __kmalloc+0x63/0x760 [ 92.243485] ? __kmalloc_node+0x47/0x70 [ 92.247438] ? __list_lru_init+0xcf/0x750 [ 92.251564] __list_lru_init+0xcf/0x750 [ 92.255521] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 92.261382] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 92.266377] ? lockdep_init_map+0x9/0x10 [ 92.270415] sget_userns+0x6b1/0xe40 [ 92.274106] ? kernfs_sop_show_path+0x190/0x190 [ 92.278757] ? kernfs_sop_show_options+0x180/0x180 [ 92.283675] ? destroy_unused_super.part.6+0xd0/0xd0 [ 92.288760] ? check_same_owner+0x320/0x320 [ 92.293061] ? rcu_pm_notify+0xc0/0xc0 [ 92.296930] ? rcu_read_lock_sched_held+0x108/0x120 [ 92.301923] ? kmem_cache_alloc_trace+0x459/0x740 [ 92.306744] ? lock_downgrade+0x980/0x980 [ 92.310872] kernfs_mount_ns+0x13d/0x8b0 [ 92.314911] ? kernfs_super_ns+0x70/0x70 [ 92.318955] sysfs_mount+0xc2/0x1c0 [ 92.322556] ? sysfs_kill_sb+0x40/0x40 [ 92.326419] ? alloc_pages_current+0xbe/0x1e0 [ 92.330891] ? security_sb_copy_data+0x81/0xb0 [ 92.335450] mount_fs+0x66/0x2d0 [ 92.338796] vfs_kern_mount.part.26+0xc6/0x4a0 [ 92.343354] ? may_umount+0xa0/0xa0 [ 92.346956] ? _raw_read_unlock+0x22/0x30 [ 92.351078] ? __get_fs_type+0x8a/0xc0 [ 92.354945] do_mount+0xea4/0x2bb0 [ 92.358467] ? copy_mount_string+0x40/0x40 [ 92.362675] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 92.367672] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 92.372409] ? retint_kernel+0x10/0x10 [ 92.376275] ? copy_mount_options+0x149/0x2e0 [ 92.380747] ? __sanitizer_cov_trace_pc+0x2b/0x50 [ 92.385563] ? copy_mount_options+0x1f7/0x2e0 [ 92.390041] SyS_mount+0xab/0x120 [ 92.393470] ? copy_mnt_ns+0xb30/0xb30 [ 92.397333] do_syscall_64+0x281/0x940 [ 92.401195] ? vmalloc_sync_all+0x30/0x30 [ 92.405320] ? _raw_spin_unlock_irq+0x27/0x70 [ 92.409792] ? finish_task_switch+0x1c1/0x7e0 [ 92.414262] ? syscall_return_slowpath+0x550/0x550 [ 92.419165] ? syscall_return_slowpath+0x2ac/0x550 [ 92.424069] ? prepare_exit_to_usermode+0x350/0x350 [ 92.429059] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 92.434400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 92.439221] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 92.444385] RIP: 0033:0x454e79 [ 92.447551] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 92.455236] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 92.462481] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 92.469724] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 92.476970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 92.484212] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 2018/03/31 08:42:46 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='cpu&+5\x00\x00\x00\x00\x00\x00\x00\x00') 2018/03/31 08:42:46 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000300)) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) [ 92.532790] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:46 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:46 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:46 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:46 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:47 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) [ 92.765202] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x3d}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}], {0x95}}, &(0x7f00000000c0)="81000000ab068244dc01a54a51ee8e3c30aefdc3c1b2008bcbf943e0428f8da61538ff58873ae13e38cddb", 0x100000001, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x3}, 0x48) 2018/03/31 08:42:47 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:47 executing program 2 (fault-call:3 fault-nth:22): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:47 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000640)={0x2, 0x206, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0/file0\x00', &(0x7f0000000740)='fusectl\x00', 0x1001000, &(0x7f0000000780)="3cf72621f0757c41a230f36eb7b554221930d6a6d91752bc5f249ab901a5c9a51176412fa193613a2cecb47f41e771fd67f502dcc1258c618478bdb645181aee80501be0091947772f9cbc242c600144ceba72802697ee311762424d289bdc1691aacf28ca7a98d72bbd64d381bb8472743079c2e0217cf277211a2789de5dfa0309b3ba7c51e1d30155efb0c1ce85a1ee92d3a59535438beb8fd861301417bdd5a3cd330f101b8854ac64bbbbe5624fbcfb7979b47805a395b8eada49de7e626b78fc97ea2faa6fdde9b7903575d8eaba960ac97dacab37c3d0b52bb53f337c3b5949") mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r2, &(0x7f0000000a40)="69cb17ed97e1fefe17f995477eb2902edeac4a8c2dd4f93976dcd590995fa788324015aecebb82250208045dc4caacc2f6bdc4196f30ff9895e7007ced332152be7930cfc47e09615eb9d1633dcec504889148d254e03f2782364b0045148988f377740edd5af8ad44d23a040000000000000092051fbb7ff6729c7ca86ea4a648b5ac334b13f057c062206682662c3d3f24d9f134b46219ab0c97bf9cbc789005ac887dec15a652329fcd54a02b60515e5a413e3c529e5157574dd76280a54be77d6c762254d67266d9c424d7bc5e8cbcab23c34ab2448a8e6ec4b0811f81a5a2ba2283000000000000000000000000000000", &(0x7f0000000940)="80a131d37ffabd3329d854300d7ac4edfea2e5ce67b21a983e8bb52e261be300ce1aaa496a30c663e29c068934006870a1139fb0c70a1e2224b3ecff2762daef88f3695cda3c13cbac494f23fbcff613939fe04bc1eb84d0c14d0560fcd90fe482f5739b0d6c4b33e222aae5c1f3484300007d2c8156e8e726a9daf00b212af9e67a7eb8c76b2c604553cc12bac6902215e91435b3fe00481978093a262f5a5371685bc6777b44204381249b5ed7f38d731c064d4b58af6681805c52b499bec0bdae8cce28582d681592f7dfdbeda36ee3810f5a", 0x3}, 0x90b44b8ec0e6997f) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000b40)='nsfs\x00', 0x80000, &(0x7f0000000b80)="273d1c4822bf3dbfbe3dcb39dc5772f5b1a3170bf4d0d16fa35e651ab52669223cb04139de83efc6f13ac4ea0e2272707684ccdc0f50b63d169383001e428971a02993be6bbfac67def34f82182c7cf6f9623cf5b8a7eb3d6254710bf88a") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) r4 = getpid() perf_event_open(&(0x7f00000006c0)={0x4, 0x70, 0xb9, 0x100, 0x9, 0x971f, 0x0, 0x1, 0x110, 0x4, 0x6, 0x7, 0x0, 0x100000001, 0xfff, 0x3, 0x1, 0x3, 0xdd9, 0x6, 0x3, 0x3c, 0x5f, 0x420, 0x8, 0x4, 0x421, 0x10000, 0x2, 0xc00000000000000, 0x3, 0xcc90, 0x0, 0x5e6e, 0x7, 0x1, 0xbb2b, 0x8001, 0x0, 0x81, 0x0, @perf_config_ext={0x7fffffff}, 0x40, 0x100000001, 0x2, 0x3, 0x2, 0x9, 0xc359}, r4, 0xc, r1, 0x2) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:47 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:47 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:47 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:47 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) [ 92.931629] FAULT_INJECTION: forcing a failure. [ 92.931629] name failslab, interval 1, probability 0, space 0, times 0 [ 92.942938] CPU: 0 PID: 10351 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 92.950214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.959572] Call Trace: [ 92.962167] dump_stack+0x194/0x24d [ 92.965808] ? arch_local_irq_restore+0x53/0x53 [ 92.970502] should_fail+0x8c0/0xa40 [ 92.974236] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 92.979344] ? trace_event_raw_event_lock+0x340/0x340 [ 92.984545] ? trace_hardirqs_off+0x10/0x10 [ 92.988877] ? lock_downgrade+0x980/0x980 [ 92.993035] ? trace_hardirqs_off+0x10/0x10 [ 92.997348] ? find_held_lock+0x35/0x1d0 [ 93.001398] ? __lock_is_held+0xb6/0x140 [ 93.005458] ? check_same_owner+0x320/0x320 [ 93.009763] ? rcu_note_context_switch+0x710/0x710 [ 93.014676] ? rcu_note_context_switch+0x710/0x710 [ 93.019601] should_failslab+0xec/0x120 [ 93.023562] __kmalloc+0x63/0x760 [ 93.027003] ? __kmalloc_node+0x47/0x70 [ 93.030967] ? __list_lru_init+0xcf/0x750 [ 93.035103] __list_lru_init+0xcf/0x750 [ 93.039072] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 93.044945] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 93.049956] ? lockdep_init_map+0x9/0x10 [ 93.054006] sget_userns+0x6b1/0xe40 [ 93.057708] ? kernfs_sop_show_path+0x190/0x190 [ 93.062365] ? kernfs_sop_show_options+0x180/0x180 [ 93.067281] ? destroy_unused_super.part.6+0xd0/0xd0 [ 93.072381] ? check_same_owner+0x320/0x320 [ 93.076687] ? rcu_pm_notify+0xc0/0xc0 [ 93.080571] ? rcu_read_lock_sched_held+0x108/0x120 [ 93.085569] ? kmem_cache_alloc_trace+0x459/0x740 [ 93.090391] ? lock_downgrade+0x980/0x980 [ 93.094534] kernfs_mount_ns+0x13d/0x8b0 [ 93.098580] ? kernfs_super_ns+0x70/0x70 [ 93.102635] sysfs_mount+0xc2/0x1c0 [ 93.106247] ? sysfs_kill_sb+0x40/0x40 [ 93.110122] ? alloc_pages_current+0xbe/0x1e0 [ 93.114601] ? security_sb_copy_data+0x81/0xb0 [ 93.119167] mount_fs+0x66/0x2d0 [ 93.122520] vfs_kern_mount.part.26+0xc6/0x4a0 [ 93.127086] ? may_umount+0xa0/0xa0 [ 93.130693] ? _raw_read_unlock+0x22/0x30 [ 93.134823] ? __get_fs_type+0x8a/0xc0 [ 93.138699] do_mount+0xea4/0x2bb0 [ 93.142234] ? copy_mount_string+0x40/0x40 [ 93.146451] ? rcu_pm_notify+0xc0/0xc0 [ 93.150333] ? copy_mount_options+0x5f/0x2e0 [ 93.154722] ? rcu_read_lock_sched_held+0x108/0x120 [ 93.159722] ? kmem_cache_alloc_trace+0x459/0x740 [ 93.164550] ? kasan_check_write+0x14/0x20 [ 93.168767] ? _copy_from_user+0x99/0x110 [ 93.172903] ? copy_mount_options+0x1f7/0x2e0 [ 93.177386] SyS_mount+0xab/0x120 [ 93.180819] ? copy_mnt_ns+0xb30/0xb30 [ 93.184690] do_syscall_64+0x281/0x940 [ 93.188557] ? vmalloc_sync_all+0x30/0x30 [ 93.192684] ? _raw_spin_unlock_irq+0x27/0x70 [ 93.197162] ? finish_task_switch+0x1c1/0x7e0 [ 93.201641] ? syscall_return_slowpath+0x550/0x550 [ 93.206552] ? syscall_return_slowpath+0x2ac/0x550 [ 93.211465] ? prepare_exit_to_usermode+0x350/0x350 [ 93.216466] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 93.221817] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 93.226648] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/31 08:42:47 executing program 3: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x6, 0x1000000000000202}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000100000000000000008000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) socketpair$inet6(0xa, 0xf, 0x7, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000002900)={&(0x7f0000000240)=@nl=@unspec, 0x80, &(0x7f0000002800)=[{&(0x7f00000002c0)="61553e5377dc81ee3f87736ef6f5c582aa2e390f5fd03c6f13abda9e49b34ff453aad3702b685a77cc934602c2f4a49afc05fb853bcc669d721e62618b5a17404648e99a0b5caa7072b143ac1f283e67c2692463a64d9c5f6cc4054efe565b3519161d7bf40acb35b8a3259589f452762ef77e7ac05831ff06ba5b56d4c919a013a9bf5a0b35ed4def1f012691382576e2de824a886f847d8486b783e07d5bfc5d87ec1730ebf931f6bb5a6506d6cc4f0f3ef7065ab1844aae9d30e58bffdf4d27afdafaaec82f502444811b7d8452c9ec5f7b286f24e2fed51e5cdde85d5d48be7cbde62c7452385702c8bebd54974493", 0xf1}, {&(0x7f0000002980)="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", 0x1031}, {&(0x7f0000001780)="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", 0x1000}], 0x3, &(0x7f00000028c0), 0x0, 0x83f}, 0x851) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x1ff) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000002940)={0x2, 0x0, [0x0, 0x0]}) 2018/03/31 08:42:47 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 93.231820] RIP: 0033:0x454e79 [ 93.234993] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 93.242692] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 93.249944] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 93.257196] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 93.264450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 93.271702] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 2018/03/31 08:42:47 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x7, 0x401, 0xd0, 0x3f, 0x1, r1, 0x1}, 0x2c) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000740)={r2, &(0x7f0000000300)="00d6e9856c5843a3d8bc4cba0f5ac147e9e4c0d96ec6ca0fcd3572fb5b1e0f6c431685d0679576b89d874941d1450b6cb851a7310884cc1379b92d567543053bfaff02cde4be49da6f9eb096667d17adb3f0c804d2f5877eb2d1b0a1eadfd7b5b1dfce2988c5df795f3b1a34c6b149", &(0x7f0000000640)=""/216}, 0x18) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) mount(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='cgroup\x00', 0x1040, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:47 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x11, &(0x7f0000000040)=@framed={{0x18}, [@exit={0x95}, @call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) [ 93.315768] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:47 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:47 executing program 2 (fault-call:3 fault-nth:23): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:47 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) [ 93.497984] FAULT_INJECTION: forcing a failure. [ 93.497984] name failslab, interval 1, probability 0, space 0, times 0 [ 93.509379] CPU: 0 PID: 10389 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 93.516663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.526014] Call Trace: [ 93.528594] dump_stack+0x194/0x24d [ 93.532211] ? arch_local_irq_restore+0x53/0x53 [ 93.536871] should_fail+0x8c0/0xa40 [ 93.540566] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 93.545654] ? kasan_kmalloc+0xad/0xe0 [ 93.549519] ? kmem_cache_alloc_trace+0x136/0x740 [ 93.554348] ? __memcg_init_list_lru_node+0x169/0x270 [ 93.559515] ? __list_lru_init+0x544/0x750 [ 93.563726] ? sget_userns+0x6b1/0xe40 [ 93.567592] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 93.572323] ? do_mount+0xea4/0x2bb0 [ 93.576017] ? SyS_mount+0xab/0x120 [ 93.579627] ? do_syscall_64+0x281/0x940 [ 93.583668] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 93.589026] ? find_held_lock+0x35/0x1d0 [ 93.593070] ? __lock_is_held+0xb6/0x140 [ 93.597124] ? check_same_owner+0x320/0x320 [ 93.601430] ? rcu_note_context_switch+0x710/0x710 [ 93.606344] should_failslab+0xec/0x120 [ 93.610300] kmem_cache_alloc_trace+0x4b/0x740 [ 93.614862] ? __kmalloc_node+0x33/0x70 [ 93.618812] ? __kmalloc_node+0x33/0x70 [ 93.622767] ? rcu_read_lock_sched_held+0x108/0x120 [ 93.627765] __memcg_init_list_lru_node+0x169/0x270 [ 93.632763] ? list_lru_add+0x7c0/0x7c0 [ 93.636715] ? __kmalloc_node+0x47/0x70 [ 93.640685] __list_lru_init+0x544/0x750 [ 93.644730] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 93.650595] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 93.655597] ? lockdep_init_map+0x9/0x10 [ 93.659640] sget_userns+0x6b1/0xe40 [ 93.663336] ? kernfs_sop_show_path+0x190/0x190 [ 93.667988] ? kernfs_sop_show_options+0x180/0x180 [ 93.672901] ? destroy_unused_super.part.6+0xd0/0xd0 [ 93.677990] ? check_same_owner+0x320/0x320 [ 93.682293] ? rcu_pm_notify+0xc0/0xc0 [ 93.686167] ? rcu_read_lock_sched_held+0x108/0x120 [ 93.691163] ? kmem_cache_alloc_trace+0x459/0x740 [ 93.695984] ? lock_downgrade+0x980/0x980 [ 93.700121] kernfs_mount_ns+0x13d/0x8b0 [ 93.704162] ? kernfs_super_ns+0x70/0x70 [ 93.708217] sysfs_mount+0xc2/0x1c0 [ 93.711821] ? sysfs_kill_sb+0x40/0x40 [ 93.715689] ? alloc_pages_current+0xbe/0x1e0 [ 93.720169] ? security_sb_copy_data+0x81/0xb0 [ 93.724738] mount_fs+0x66/0x2d0 [ 93.728087] vfs_kern_mount.part.26+0xc6/0x4a0 [ 93.732650] ? may_umount+0xa0/0xa0 [ 93.736260] ? _raw_read_unlock+0x22/0x30 [ 93.740389] ? __get_fs_type+0x8a/0xc0 [ 93.744263] do_mount+0xea4/0x2bb0 [ 93.747787] ? copy_mount_string+0x40/0x40 [ 93.752002] ? rcu_pm_notify+0xc0/0xc0 [ 93.755879] ? copy_mount_options+0x5f/0x2e0 [ 93.760265] ? rcu_read_lock_sched_held+0x108/0x120 [ 93.765258] ? kmem_cache_alloc_trace+0x459/0x740 [ 93.770080] ? kasan_check_write+0x14/0x20 [ 93.774293] ? _copy_from_user+0x99/0x110 [ 93.778427] ? copy_mount_options+0x1f7/0x2e0 [ 93.782908] SyS_mount+0xab/0x120 [ 93.786337] ? copy_mnt_ns+0xb30/0xb30 [ 93.790209] do_syscall_64+0x281/0x940 [ 93.794075] ? vmalloc_sync_all+0x30/0x30 [ 93.798202] ? _raw_spin_unlock_irq+0x27/0x70 [ 93.802679] ? finish_task_switch+0x1c1/0x7e0 [ 93.807154] ? syscall_return_slowpath+0x550/0x550 [ 93.812066] ? syscall_return_slowpath+0x2ac/0x550 [ 93.816974] ? prepare_exit_to_usermode+0x350/0x350 [ 93.821969] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 93.827315] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 93.832141] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 93.837311] RIP: 0033:0x454e79 [ 93.840479] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 93.848177] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 93.855426] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 93.862675] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 93.869923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 93.877174] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 [ 93.899751] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:48 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xf, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:48 executing program 4: r0 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000b00)={r1}) r2 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r4, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) r5 = getpid() perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0xfff, 0x1, 0x5, 0x0, 0x0, 0x8, 0x80, 0x1, 0x6c7e, 0xfffffffffffffffc, 0x7fff, 0x8, 0xf9, 0x6, 0x3, 0x3ff, 0x3620, 0x2, 0x265, 0xb987, 0x401, 0x9aa4, 0x2, 0x7, 0xff, 0x0, 0x1, 0xfff, 0x5, 0x7, 0x853, 0x91, 0x81, 0x8, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000002c0), 0x8}, 0x6840, 0xb61, 0x5, 0x7, 0x8, 0x2, 0x9}, r5, 0x5, r3, 0x1) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r2, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r4, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='rootfs\x00', 0x20000, &(0x7f0000000700)="b0267bb0c4") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:48 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:48 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x0, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:48 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080)='L', &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000001c0)="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", &(0x7f00000011c0)="c45e0ca3a1ec3b06a0e3706115ca4d4dd7536e7403aef057613b5ccc9fdeb28e59e873c741eb9404831026f2c89d72bf48f046a02a481adcdb5cab079cadbf98b5f1cd773734c404faa74614ef02136ad9f8c032c26beca7526d22372ca702da3b7c14c1ea9cc17d40dece0815b6d9e35bb759ce52755441073474da612f0bfa5763584b98ce4acacdd7c1634e3701f9774d7437aba872f1e23c72b253791258a498ab1bae3b7b2a999aa307bf347d8b758fb022b5f37f429b0b1136ef", 0x3}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/145}, 0x18) 2018/03/31 08:42:48 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:48 executing program 2 (fault-call:3 fault-nth:24): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x104, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x382) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1e, 0x0, 0x3, 0x6, 0x1, r0, 0x6773}, 0x2c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x2, 0x7, 0x8001, 0x10, 0xffffffffffffffff, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0x5, 0x1c5, 0x2, 0x1000, 0x0, r1, 0x40}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f00000004c0)="a3261c57", &(0x7f0000000500)="cd8249bf39d6176ef7346799ac199e6cf9e7fe02418812a394d9c874384d4ba7bd9d3b261f1a018d54c20e688a5dc8a23babc41d618eab351795754d5fa3ad297aec7e01f2990b", 0x2}, 0x20) sendmsg(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080), 0x1e}], 0x1000000000000020}, 0x8000) sendmsg(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)="654e8525c3d8a3a269fffab981c018ecd1ed1d41250e8cefbd5ee4bae370ceb76f18994299803c8f3c007db0b506d27a8d38bfd14b9dbdb9ab629de7de0672b365dce9cc2ecdff6971cd9b53ca275ecf9b426cade30df9ed069f246ad81f0fb4cef7a4d8504b908dddbad5235664fb43456c105d465f9e08de48116686d69255a3fb4d9f00907b0d2bb8743018c8568cdd1a098362e9db2beb107321a56d3b31b84590e0ea80d526985b20473a7c", 0xae}], 0x1, 0x0, 0x0, 0x80}, 0x20000000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={r0, &(0x7f0000000680), &(0x7f00000006c0)=""/166}, 0x18) mount(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='pstore\x00', 0x4, &(0x7f0000000640)="afb63e3ff55419f9e9572aabeb90d8184a20d3c850fa576f0f0d376978dcd77395a8eb26002ef5146d") r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000940)='./file0\x00', 0x0) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000300)={r3, r4}) r6 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r4) close(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xfb2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003700)={&(0x7f0000000280)=@pppoe={0x0, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003400)=""/251, 0xfb}, {&(0x7f0000003500)=""/14, 0xe}, {&(0x7f0000003540)=""/107, 0x6b}, {&(0x7f00000035c0)=""/211, 0xd3}], 0x4, 0x0, 0x0, 0x3ff}, 0x1) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000008c0)=0xffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000001c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)={&(0x7f0000000a80)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x100000001, 0x3, 0x5, 0x2, 0xffffffffffffffff, 0x9}, 0x2c) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0xe, 0x7, 0x1, 0x80000000, 0x8, r2, 0x9bc}, 0x19a) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000ac0)={r9, &(0x7f0000000b00)="e1970e592c2e3341", &(0x7f0000000b80)}, 0x18) socketpair(0x10, 0x5, 0x3f, &(0x7f0000000840)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r10, 0x89e1, &(0x7f0000000880)={r7}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000800)) [ 94.054639] FAULT_INJECTION: forcing a failure. [ 94.054639] name failslab, interval 1, probability 0, space 0, times 0 [ 94.065917] CPU: 1 PID: 10418 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 94.073183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.082533] Call Trace: [ 94.085119] dump_stack+0x194/0x24d [ 94.088751] ? arch_local_irq_restore+0x53/0x53 [ 94.093432] should_fail+0x8c0/0xa40 [ 94.097145] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 94.102262] ? kasan_kmalloc+0xad/0xe0 [ 94.106147] ? __kmalloc+0x162/0x760 [ 94.109859] ? __list_lru_init+0xcf/0x750 [ 94.114009] ? find_held_lock+0x35/0x1d0 [ 94.118438] ? __lock_is_held+0xb6/0x140 [ 94.122506] ? check_same_owner+0x320/0x320 [ 94.126831] ? rcu_note_context_switch+0x710/0x710 [ 94.131760] should_failslab+0xec/0x120 [ 94.135727] kmem_cache_alloc_node_trace+0x5a/0x760 [ 94.140734] ? mark_held_locks+0xaf/0x100 [ 94.144877] ? __raw_spin_lock_init+0x1c/0x100 [ 94.149461] __kmalloc_node+0x33/0x70 [ 94.153263] kvmalloc_node+0x99/0xd0 [ 94.156976] __list_lru_init+0x5d5/0x750 [ 94.161042] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 94.166921] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 94.171925] ? lockdep_init_map+0x9/0x10 [ 94.175970] sget_userns+0x6b1/0xe40 [ 94.179667] ? kernfs_sop_show_path+0x190/0x190 [ 94.184318] ? kernfs_sop_show_options+0x180/0x180 [ 94.189226] ? destroy_unused_super.part.6+0xd0/0xd0 [ 94.194313] ? check_same_owner+0x320/0x320 [ 94.198610] ? rcu_pm_notify+0xc0/0xc0 [ 94.202482] ? rcu_read_lock_sched_held+0x108/0x120 [ 94.207474] ? kmem_cache_alloc_trace+0x459/0x740 [ 94.212292] ? lock_downgrade+0x980/0x980 [ 94.216422] kernfs_mount_ns+0x13d/0x8b0 [ 94.220465] ? kernfs_super_ns+0x70/0x70 [ 94.224507] sysfs_mount+0xc2/0x1c0 [ 94.228110] ? sysfs_kill_sb+0x40/0x40 [ 94.231975] ? alloc_pages_current+0xbe/0x1e0 [ 94.236447] ? security_sb_copy_data+0x81/0xb0 [ 94.241005] mount_fs+0x66/0x2d0 [ 94.244355] vfs_kern_mount.part.26+0xc6/0x4a0 [ 94.248913] ? may_umount+0xa0/0xa0 [ 94.252515] ? _raw_read_unlock+0x22/0x30 [ 94.256640] ? __get_fs_type+0x8a/0xc0 [ 94.260508] do_mount+0xea4/0x2bb0 [ 94.264034] ? copy_mount_string+0x40/0x40 [ 94.268249] ? rcu_pm_notify+0xc0/0xc0 [ 94.272118] ? copy_mount_options+0x5f/0x2e0 [ 94.276503] ? rcu_read_lock_sched_held+0x108/0x120 [ 94.281494] ? kmem_cache_alloc_trace+0x459/0x740 [ 94.286314] ? kasan_check_write+0x14/0x20 [ 94.290527] ? copy_mount_options+0x1f7/0x2e0 [ 94.295002] SyS_mount+0xab/0x120 [ 94.298437] ? copy_mnt_ns+0xb30/0xb30 [ 94.302299] do_syscall_64+0x281/0x940 [ 94.306162] ? vmalloc_sync_all+0x30/0x30 [ 94.310284] ? _raw_spin_unlock_irq+0x27/0x70 [ 94.314756] ? finish_task_switch+0x1c1/0x7e0 [ 94.319227] ? syscall_return_slowpath+0x550/0x550 [ 94.324131] ? syscall_return_slowpath+0x2ac/0x550 [ 94.329047] ? prepare_exit_to_usermode+0x350/0x350 [ 94.334046] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 94.339401] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 94.344223] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 94.349389] RIP: 0033:0x454e79 [ 94.352555] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 94.360238] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 94.367481] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 94.374724] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 94.381971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 94.389214] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 2018/03/31 08:42:48 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f00000002c0)="72d32a3dd734df0879e88c31db2eb700c4b8d78a845a1dbd011adb0c0e24a729e4dbf51ac93e7e2a1662b602ef3d23f76c443ec29af2a34e55bf684dec01e95ad47d86aa37d1b4236b6a3ee9f3513a40438ebfe4a0bc2f86336ef725019154138195ff8bde1f", &(0x7f0000000380), 0xfffffffffffffffc}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:48 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004400)=""/161, 0xa1}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 94.413053] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:48 executing program 2 (fault-call:3 fault-nth:25): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:48 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xf, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:48 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:48 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:48 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) recvmsg$kcm(r2, &(0x7f00000007c0)={&(0x7f00000002c0)=@ax25, 0x80, &(0x7f0000000780)=[{&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000640)=""/124, 0x7c}, {&(0x7f00000006c0)=""/162, 0xa2}], 0x3, &(0x7f0000001940)=""/4096, 0x1000, 0x1}, 0x2) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:48 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x0, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:48 executing program 3: mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000040)='.', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='binfmt_misc\x00', 0x0, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6(0xa, 0x80800, 0x7992676d, &(0x7f0000000040)) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000500)='nsfs\x00', 0x20, &(0x7f00000004c0)) socketpair(0x0, 0x0, 0x1, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000001840)='./file1\x00'}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r2, 0x0, 0x73, 0x5c, &(0x7f0000000540)="cb40a10eceab2673b1b10d32d602b6ac99ba57e642e7a39d975d5c600ef96b6e08944aa442042b81748d5db438c5dd2ccc931b2ec8c73dabe7c57247e3af08bb6918a53833a062c8edf39a8ceab36f5f7fa05695dbca78013b888f942ce32ebeee45b45a6e2928a7339dc857541e75c261f6d8", &(0x7f0000000600)=""/92, 0x7, 0x5}, 0x28) mount(&(0x7f0000000800)='./file1\x00', &(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x10000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r1, 0x50, &(0x7f00000003c0)}, 0x10) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) mount(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='xfs\x00', 0x220004a, &(0x7f00000002c0)="93cdd250f3245eb3353ca2d4abefe0db64b49641f396ea3563c4737336b1cd1c16ca6a4871828e1c6cb804b15664d769f0d01cf492333fa6ce0bb5abdaeef401de3c0c8239b5135612d2a21c27832a54cd4f4373c32da205c3e1a9460d3c7ebc3750db872bca9c584abda344c9d09fe3af550453283729f6744e420272cbbae11c1c417c1115a296ced13e7479da37430e169ea770c7a47af3d8c55da50b7f4ea1917b67b1d201d2a469ec4f4555faea") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) mount(&(0x7f00000005c0)='./file2\x00', &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='xfs\x00', 0x860024, &(0x7f00000008c0)="0c669d929bd0efe3e80c3f24572297e21058c35f72fb46243fd6de2795dd7f082fa2ffc738a580e35edd7d8ec3494b1c53e6abde1527677a539be63bfdc41cb58dbc64384859ad29260e900f7c39aebbb4e091b3b42e14e44ff33ead9cccbd0dde92c22b2ff0b627facb742b6a2d7c22fee54caa1da4378d2d1e7361") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) mkdir(&(0x7f0000000080)='./file0\x00', 0x201000000004) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x3, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r4, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r3, 0x50, &(0x7f00000006c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r5, 0x200, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) [ 94.650967] FAULT_INJECTION: forcing a failure. [ 94.650967] name failslab, interval 1, probability 0, space 0, times 0 [ 94.662327] CPU: 1 PID: 10451 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 94.669598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.678967] Call Trace: [ 94.681559] dump_stack+0x194/0x24d [ 94.685202] ? arch_local_irq_restore+0x53/0x53 [ 94.689865] ? __save_stack_trace+0x7e/0xd0 [ 94.689972] 9pnet_virtio: no channels available for device ./file0 [ 94.694186] should_fail+0x8c0/0xa40 [ 94.694202] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 94.694215] ? kasan_kmalloc+0xad/0xe0 [ 94.694229] ? kmem_cache_alloc_trace+0x136/0x740 [ 94.718006] ? __memcg_init_list_lru_node+0x169/0x270 [ 94.723203] ? __list_lru_init+0x544/0x750 [ 94.727441] ? sget_userns+0x6b1/0xe40 [ 94.731328] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 94.736072] ? do_mount+0xea4/0x2bb0 [ 94.739765] ? SyS_mount+0xab/0x120 [ 94.743375] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 94.748725] ? find_held_lock+0x35/0x1d0 [ 94.752767] ? __lock_is_held+0xb6/0x140 [ 94.756812] ? check_same_owner+0x320/0x320 [ 94.761116] ? rcu_note_context_switch+0x710/0x710 [ 94.766037] should_failslab+0xec/0x120 [ 94.769988] kmem_cache_alloc_trace+0x4b/0x740 [ 94.774549] ? __kmalloc_node+0x33/0x70 [ 94.778496] ? __kmalloc_node+0x33/0x70 [ 94.782444] ? rcu_read_lock_sched_held+0x108/0x120 [ 94.787437] __memcg_init_list_lru_node+0x169/0x270 [ 94.792430] ? list_lru_add+0x7c0/0x7c0 [ 94.796381] ? __kmalloc_node+0x47/0x70 [ 94.800336] __list_lru_init+0x544/0x750 [ 94.804378] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 94.810239] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 94.815234] ? lockdep_init_map+0x9/0x10 [ 94.819274] sget_userns+0x6b1/0xe40 [ 94.822963] ? kernfs_sop_show_path+0x190/0x190 [ 94.827614] ? kernfs_sop_show_options+0x180/0x180 [ 94.832519] ? destroy_unused_super.part.6+0xd0/0xd0 [ 94.837606] ? check_same_owner+0x320/0x320 [ 94.841902] ? rcu_pm_notify+0xc0/0xc0 [ 94.845770] ? rcu_read_lock_sched_held+0x108/0x120 [ 94.850758] ? kmem_cache_alloc_trace+0x459/0x740 [ 94.855574] ? lock_downgrade+0x980/0x980 [ 94.859707] kernfs_mount_ns+0x13d/0x8b0 [ 94.863748] ? kernfs_super_ns+0x70/0x70 [ 94.867788] sysfs_mount+0xc2/0x1c0 [ 94.871392] ? sysfs_kill_sb+0x40/0x40 [ 94.875254] ? alloc_pages_current+0xbe/0x1e0 [ 94.879725] ? security_sb_copy_data+0x81/0xb0 [ 94.884282] mount_fs+0x66/0x2d0 [ 94.887628] vfs_kern_mount.part.26+0xc6/0x4a0 [ 94.892185] ? may_umount+0xa0/0xa0 [ 94.895788] ? _raw_read_unlock+0x22/0x30 [ 94.899915] ? __get_fs_type+0x8a/0xc0 [ 94.903782] do_mount+0xea4/0x2bb0 [ 94.907300] ? copy_mount_string+0x40/0x40 [ 94.911511] ? rcu_pm_notify+0xc0/0xc0 [ 94.915381] ? copy_mount_options+0x5f/0x2e0 [ 94.919762] ? rcu_read_lock_sched_held+0x108/0x120 [ 94.924752] ? kmem_cache_alloc_trace+0x459/0x740 [ 94.929570] ? kasan_check_write+0x14/0x20 [ 94.933786] ? _copy_from_user+0x99/0x110 [ 94.937910] ? copy_mount_options+0x1f7/0x2e0 [ 94.942385] SyS_mount+0xab/0x120 [ 94.945811] ? copy_mnt_ns+0xb30/0xb30 [ 94.949678] do_syscall_64+0x281/0x940 [ 94.953544] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 94.959058] ? syscall_return_slowpath+0x550/0x550 [ 94.963962] ? syscall_return_slowpath+0x2ac/0x550 [ 94.968871] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 94.974210] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 94.979039] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 94.984202] RIP: 0033:0x454e79 [ 94.987369] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 94.995051] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 95.002297] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 95.009540] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 95.016786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 95.024036] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 [ 95.103423] EXT4-fs (sda1): re-mounted. Opts: [ 95.136386] overlayfs: missing 'lowerdir' [ 95.146306] EXT4-fs (sda1): Unrecognized mount option " f’›Ðïãè ?$W"—âXÃ_rûF$?ÖÞ'•Ý/¢ÿÇ8¥€ã^Ý}ŽÃIKSæ«Þ'gzS›æ;ýĵ¼d8HY­)&|9®»´à‘³´.äOó>­œÌ½ Þ’Â+/ð¶'úËt+j-|"þåLª¤7-sa" or missing value [ 95.216494] overlayfs: missing 'lowerdir' 2018/03/31 08:42:49 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004400)=""/161, 0xa1}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:49 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000000100)="23c3c944bc48b807d6f22257ec45c73e35352f82c131e625e7633450dd5228bb538a0e2605f99fecc391058cbfc8775285036e42d036321bfdf087259c52fe72940b616fb6a8dad7", 0x48}, {&(0x7f0000000240)="c545542e40d31d0740d282e7aedb29089741fd38186939a344be3e453877ebf8c8bb47c1275a82e24c44c6d604278e7d30e9ca09d8f84f1bfba36f3d21ca08668ea1861e6e263180da093c8cb6cdb0d81765f14ad9054e9a676eeb9c27f556d0e4f8c1bdc3be86ab50520a1b7590e17015a75087163419cfbe7e019beb1c6ec1f1236d095e86c049d7ea7f98587631f05f3a5dfcd544761db8f420ce349a1d20426eec527686c3bc5746aaeed608f4d4140206b8c5", 0xb5}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="3efc7dbc6e705aa81b7fef6a49937e5c4158a0f54f6feb433744e404ae3f4f3de2a1dff2db3b460c38ef618d900dac48859f3f84804ba92acf0829eda38787ad3b653dd5f81bad829c2392a2bff4696580917efc8ec82258f3ccca85babae1c92d9393d5a4787360ee471afe67b8a96806459fcd789672cf8930d52e992c7f43b8bb1f0874f246665261798020aa7f9acf94d4518f0cd071cb2595bb60e37241e646363479943fddbabbb29181b3d123f588eae5b46b21a95e172083ae2ac1773a49e770c603b3c4b845a3ed3d9eb05d120f1732f4252f7021a5571e84cae09bd4d510b39d3e8759702c659b1987314ca7e1c2be8429e4f022f5a9e588dedd71b96abebc5fe4e46f864189530af12c25bd3b4461c54b629c9e52f6e4b49f460a0f33ec4b079a5addc4823632711b06e086bc36d64e23ce3fc836709655d14e4265d7483c02d8aad56b314c1f0fa73e25cfcdddd9b074125af70e3ca304f143785c5b81c06d062070a0341164c09b1d1fa2900b61124c38c5805770d5308ba316f07156ce8a9c164ef259d9936abc9937542690c8729edaa814338ad0586cd5cf3224b7d65d9191c5b05f1d6a93e7ddea0fb0ad9a35721959c832112419d9e29b1a601e7027277fb26585e1479c8c19d374f890ce9602c06ee0222a6da70c2acb98b3c9c1b09eeffa050dbc9e736f68ef8372d3495e5d5cc6cd62623b329ffb70dee56b64ebd2ade8cd991372210f4eed5bb9b7208a9034d46b3062b693f329260348f0f127a657db053f928c9828e6996ce806c81c49f95518234b6ba6340830a65a23990bb2eb180c8979c60e8d7338549817df6c62ba2121c5f8cdbf2e987c224d894c4a0a1d2edae7788537824e84d0fd50d030584a57b48438bfa30fd9ffc18182e69c595971b5e2e501e2dcd328b52ff5d71a33c7e5561b477d1af16ad59c92fc88e41f2177cca7d54ac5c1d25661b120459e80ea84917be5d82475b00b7da3855213a8d207a0e23178dcc242e8e1b92d960799f708e23ab47b731bcfd28e940104c0dc6913cf59a24b1827a7fa5f6d0559ce800fbb209ac91d81e6b14e36b9a64ddd9e3a17817ff4e4ee04c2f0f8c8cb20cf0d7b0b00ee1dc19ce3868836422a7d243d55ed190f1e9f5444513c351a7ae516571679805c5d165779c4ba6e7d9ca307a4a369817ebe65f3d780af116818a8c2efa20d0db66e02a4ecff2ca3135477c451d14162ab1803beec5355b767ae4e97aca7bb80d0cc2c257e8d5db7bd48586b8a360ed9ebb6aadba9ef60bbf758d00a6b9821a725783ad3311e3800fe6cf7afc5083317a23a572458173aa27a6bacfdf77a1985084bd93c083a2eb2e3728d4cbff18ab9a2dfa5744194529b8804989e4b6e535e11b7610380d832593888b7331de8e962bccd1e380d5223f81f5c74a39a847d465a2afbb7eef7d91e164363ea5f45c01b3e055d045fd0c1ffe353dbbff6f7034993a40dbdd09fdc511738f2484fbfe190e135b94db6b7fb81c610c080e4ab3510437cc5ab7f10e9f0ffdc2a8306511b873dfad186bf68472c42c6fa01646a70cce4b9f104ee475f957dcd037a70d870a721289011f2d95be65a33df07f9253d72c461acf6e812569ea858d6f5ef88acfb135d64550b17fa45bd8664a264e04e3125565cdfe4d995badf916482f583a5ab21eb87c8466973d018ddd9596ae62af80f70fa86bcd539872cc6b6b61a255400fd8e825c8a8c0b2b03b4a2e69616a50ef16283b54d4155d31d6fa0f1f7bc233543129a3ed6a88e624f10a3ebfb023e04aa39e80fa3e2efb5f5a74194c51151251ca4efbc8945588b3e5ce2e4d5e4d73b001629d2b56a4e648535668492fe98e57a0b81d0ffb981967ead3f8c3f57a21b455ca8d41d88468f83cbd19ce9f77b8eb28f95ed52797056f658aaab93c171b5505a7cb8380e9f00d38fa4993b7becf0c0c9a7f5c7df4027609e9d11f67bd85ec4e2c574987b109d10d8581c5de63e4c9063b5f148254871198d6f2d0b680909592ab4dd19c68677e2618d0945ce62ccf08a49345f94ebfed28754532503915b1a239074c7720d87258fa12a2bac49d510132ee6d9128ca0357a5d625ed6a625cc2ab400e9e744c8745b1f2d1ca5f091c59c3e2da4adfc4d2cee7a0b8a196449ae7ee6cb5d0fa88cce46c068f42e19e13f025e4126dd856921a1a5380ede975970f6e0f8f7b8f73bfdcca9a1d55f9d791ba68a6b660705d7681dd4b2f2e65da99ddc0e01a93213b91e36e15d7428ba5ee96394b626408165ecf76e6b21673ed6b8ae4683e42c97879a59430af053dcb0baad5fdc89f90d8254ae4f9b913fc47f94cd867895a330576053e6ecd1d70cba937d307c2b93fdd7aed0583cc892f781c9560f35013115484d4410757f27ef46042bb1744660f3c83edd63f173b69a4785e18f377cbf2969ccd602c42c95abb284ab35834e225967bb05979a4f681e0e36bd0917f930b035f90c704deb0ad1ba83317fc018e32d024ed9fe840e6ad615e7227b23063a68dbde9071708e30c5863535462c35d0e0c16aa7a02a4f1e2629513a881a166064b12fd758bf5e63df94e8f3526a8402e4faf0a0b240b77b6d8fdc9e5cd8adbbdb2347080fcc6f151ca0bc381ae5aa379562c9c122dc5fb32d6498d173379916f6760d2d8b337d738c5b7ba86ad0c83db7d6e37c3d18eec78fddc6e4801446d85d93b8ba32e19929243f8b159e86311639af05a0df254473f251173c524d04712280a27f6d42344421aa105f4361ae71880ba0f8efa436f1dc40a181e3e982e560c757e2769e6c60a65a102dd75617bce68a0769e8f83f04f37095491fcdfe5ec0693f1321f4818db5af72ecae513c42a1cac2683a7bb5f4142be4370e98869e5b0f64dce243537037c7a03056dbb8f2393b6332e496741f8cdfaac5aa0d9f425806500cd2ccd798f3373c8021612ca3009a2c8d3ab6950589abbf9cf43c52c9cb585610cdcee5a80c332b1bcb0185aa090811c2149ae5d45fca1ea30377f553c464a9892a170b79956d66f6139a151e7f1818b2669a1214ccfd515ba06189c079b5a28d1d13778c41aa845150e61c4bafc6b08c6d25c8f6d3c21b9a1647b844cf58e6e6fd544efed2dcb4acf2798e86d70f7811eb8fa9731ad95857e2288d46f82365e402e0f813a197ee005d6ce39068b475a77e07de31e03a2897a56dfa471347dded55b9cf4bbe86eec5c54a61fc356e3a9850ea87780f7f058121af83518aef0ed3ddb9a2a53a185696ab54f97a6699ecc7cd56f9edb8bda83068d29ae25b051165f6102b20d2108adf48f830f8aa130be8a62135f6a62af446971a91ddd8faa69cda26c167bf0cdd3e5c0c207fcc1a315494db39bcbdf355a73ed23bee86e7988232a2caaa5a940065cf3848d5142e0c4ab4793531a3e7a8ef1129fa79d0aff07171c5fef1a9b5f0a4c625646dbb695555cdd48ee51c1d49e029fda2f86ff7cfc059dd3be49790fa367fc07f4ea7991a09c35d087c626aae27e48b8f85fde43c0345680236ce9581c228ab65451ddc9fa3fcf1a787f0687c6e15a3444123206fa888173102716b50c61dd68333f719e7bd139a2cc29cd6c24013cabc837cd8eea8da842fa82220de48e2d0210c5d2ae7fe7814ab7fe6db993a802e3a5a41be7c63663ab6a048c9eb80867f8f806c636efa5d36141f90675aaaad4756f162ea262ddd28aeeaa51816a298d35c33a89b62e118901ad593a444ebd7e3aa7b8f30f61398e84c70835e24ac82f6c47529e9197c19a7c2568a0459aa726f7ba0dc643ade168b112969df67c9503ecdfb13fc3c2a2807ca879d6852e5e019ee2fc611792224b37d9a19483914e1afa7ab0080b9e35a3eb19aaeb633fead751344b250224420ced69de9c961c1c2f9a90e9d1696a39d577dcf341ff12124b16cdffac06abcb6747de83275b9cd5532eff407d4adddce500e04c58d05660ed61b538cdeffe5116198ff9f5182b5b9a2519392f5ead93884f849827a77c1717016192fc20eeade70274c17d4dcf6a763bea20eb765fa6a446c97db706090ed80c7a3c84a50c4b32d82d3a57f2d20f50e438c609d82761864a1bd69aa9938521c25e722b76f409abb3655eeea3bef40d15e11157cf7c46992d5042e2c8e8c7f1dd8207a3b4e108d45c7946715e4a2a3a36725b3e74de1ff4b81b8545d26ffe4e21ba5f5ba991751e96f8a947aa7aef10199ba49f7660efe5d6f3a8d6eef77e71d9d2d939803ec8624e90c2eaf1b0237f54b2772be9ad6bd5600798492b872ebbc727abe8d8708689c48278525c4b847881f27494f153891445a9a067c55e3caf82a5eebd69406ba0935a694bfc385278e24c2eca6e7c24219defa6a4d79664049274f78cff82f423bbbc6df043da06dd7b534f6cf650bdc86f818b49443f29aeca5e2c37e60ee119b47de022b377d6771b4bebcaf07645ee0f01ea968bf40ebb192c0654e455dfb470dc4dd48f37c08732982110ab5e754463a1c318724bb1d7b2ba0cf91df5dff20331ecd19ac150b0e9e4583e935ac47a16458fcc1bf92eafa95ca0fda152a0aad3626d16b00bfd34115c441579bb1a86bbf032fd8667f929c7d28ea3f0bfff64acef299b11b726eab92c617ad151d93487b7411885a8e71b296278cad9cb162cf806959ec5b09b0b8b78676fab8b0103323e58fd70aa5d135b8e539c27239eb0ede73e23f91379372a32adfa5baee456ca4e35cc7bd71fa3bd2d6130feb079118b7c8c4cb0f3b5fea58c5650e739686bf0befe6d0266251d9b6aff4608b1b7f596f2b8d6e61982489e0acb6705b2f3f20a00c6b0892455483c4419dbc9419c5f6df8f702b1d79e23c4525b64f287ee1f490903f550965ed1e8d584520f594577c9252f10d7ecb1fdc1d3958348b4aa26bb70e8e2eaa9a96d3b2668fd4aee8dac97509d729e2b5a02e87f56791512d8fab6ba0d16ba352dbf928387bb098366cdfc0aded6ac7a650f1ad92a5e2047592cc4ffc1f273e9a8f46cc0d0266bda2625adde28af52bfd32d9d7490fd98f9bfce488d4c780ec40ebcc5eac40101209997fbdb7603786fba66af001dd9fd170975a496ce2d1b7785430a036c2e39140132f78d39378caf46645634594aee6a95e91923c5a7c3efaf7d1641652ed16dc32cfe69014aa896deb7100ffff09981d5fdaf475a7e3522b904ee8cc834a76163874c635cc2f8eb9d37846b1e8847fd633a3f149dde9925dc20a8bbdf5ae7f6ab99cba70957df5763ca2528327aa2bd11a4f9447e6340018b7c4bee0b8b9229de6e949ba39c5ac110c4b926e1596380cc8cbe81f729669cd6633efec44adef4d749d7049e8c5e7abc5047b3a433097ec7ca7fcf1351125e5217b917c2384400395c5ea1d16cc3d4aa92d8b50f737120544c6b3daa4498716f7c7a4e72424049949330b593fc73fbf8101909f04dcc1bb755982ec8fc6b619972393db41e89fc8ba654de21efd432523e7f7b7e3d80024898ea3895ced063ca7fd6deff2315f4879defaec28b585eeb3af58db110b9d260f56b576681e505aa3a35639c27143842b3e4dd6b5381ae59e3479c7723d38bc82dd5823fd89a089f4a54f59c0d38c10efea6bb515ec24f1481bcff1cc6845062ac48ca140bbdf474ff35247e4b3c5ab2b897a22b647cd25a29871745114e861be86f5b5c3cb0b0095d18c2f2aaab0fe03a75b584a8f104c0aac58a53c6c2cd041052daf9ef12ad4ca535dc05a38c4ee690ff9edffb3dd45c13fb5e9b1afcee26f4dd3794bc066d31d5b931a25", 0x1000}, {&(0x7f0000000180)="edceb9d08a0386fe28447ebd0c7975529345b5d3dcc4e31a1ab8aa3a0b509c", 0x1f}, {&(0x7f00000001c0)="9a35077057576d060a44b538bd455d32950a626c0a5c98d36cf0f5fa1da17a627f67712d7e87ea39167f477cc981", 0x2e}, {&(0x7f0000002300)="2d01b3c16c14f571bb115b98eb231537a6cd0d15adef19f6c593a433d994e1dade75aa2fa86db06f163e6a3bab037e4cebfab0eb9bc77e07ce58eae408a67ceaa18226c53254e71cc3ac3122dee34578d51155a04cc929cab850f251", 0x5c}, {&(0x7f0000002380)="d025851fff220508735d738a65f5bfc82a21d684bbc1e45185df79db8274b3a981e3a2f5f13841dcedd356966a4e54bbd6e56dfc75c22c946866771cd6846b860ade3efe56e021ffcc95097f206da3d44cb4cbb8080d3ff7d2731eafcaa8b15eb2e8b8b6d842216d54655c336b01ba68c2c630b5febba1ac8edf1e34e4", 0x7d}], 0x8, 0x0, 0x0, 0x15}, 0x4040000) perf_event_open(&(0x7f0000aaa000)={0x40000000000002, 0x70, 0xa, 0x1000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x800, &(0x7f00000000c0)="e45120d9338480f0ac73a87ead057e624f367d39a25ec0c0fe") 2018/03/31 08:42:49 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xf, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@call={0x85}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:49 executing program 2 (fault-call:3 fault-nth:26): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:49 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r2, 0x0, 0xfb, 0x67, &(0x7f0000000640)="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", &(0x7f0000000740)=""/103, 0x5, 0x800}, 0x28) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x1, 0x6, 0x7, 0x7, 0x3, r1, 0x380}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000840)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) recvmsg(r3, &(0x7f000000edc0)={&(0x7f000000da40)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ecc0)=[{&(0x7f000000dac0)=""/36, 0x24}, {&(0x7f000000db00)=""/104, 0x68}, {&(0x7f000000db80)=""/236, 0xec}, {&(0x7f000000dc80)=""/4096, 0x1000}, {&(0x7f000000ec80)=""/24, 0x18}], 0x5, &(0x7f000000ed40)=""/86, 0x56}, 0x2122) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f000000ee00)={0xf, 0x5, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000090000000000230e005f42105c89dc9a006365000069e41be6000000050000"], &(0x7f0000000800)='syzkaller\x00', 0x3, 0xe6, &(0x7f0000000a40)=""/230, 0x41f00, 0x1, [], r5}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000940)="8c3448c417b23f9e34fc78189fe9e42126ff6d5dc7574f1e035a6b8f55c337258917d324c4ee068d1e6b673dd3b0f5deffeece5575d5c92896c252d0428f7f878a54740224a1a5a35e929eb537b0ac36bdc74d5744c1799d41c8e6d5eec24425a12f213e39513db555adfeb81c7cbb750d049d13f432cd5d31afbdbc3d6867a5cf45f13ef431d4cbf08d1d893a2f8e596cc36a78fbae5dc748d141d5ffce1f68fc340c3ec0ded1f52d681ee92eeb5c12c66210c497aa7a12fbd81b1580dcc02606d106389e37e402b639ee53648e9f3f897be48271100f29ecc297cbcda4197495bb80ca3cd80acf5d1e18"}, 0x10) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 2018/03/31 08:42:49 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a76"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:49 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x0, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:49 executing program 1 (fault-call:4 fault-nth:0): bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) [ 95.288745] FAULT_INJECTION: forcing a failure. [ 95.288745] name failslab, interval 1, probability 0, space 0, times 0 [ 95.300074] CPU: 0 PID: 10490 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 95.307354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.316704] Call Trace: [ 95.319279] dump_stack+0x194/0x24d [ 95.322899] ? arch_local_irq_restore+0x53/0x53 [ 95.327570] should_fail+0x8c0/0xa40 [ 95.331272] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 95.336356] ? kasan_kmalloc+0xad/0xe0 [ 95.340224] ? kmem_cache_alloc_trace+0x136/0x740 [ 95.345044] ? __memcg_init_list_lru_node+0x169/0x270 [ 95.350216] ? __list_lru_init+0x544/0x750 [ 95.354428] ? sget_userns+0x6b1/0xe40 [ 95.358299] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 95.363037] ? do_mount+0xea4/0x2bb0 [ 95.366736] ? SyS_mount+0xab/0x120 [ 95.370344] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 95.375693] ? find_held_lock+0x35/0x1d0 [ 95.379738] ? __lock_is_held+0xb6/0x140 [ 95.383793] ? check_same_owner+0x320/0x320 [ 95.388106] ? rcu_note_context_switch+0x710/0x710 [ 95.393032] should_failslab+0xec/0x120 [ 95.396991] kmem_cache_alloc_trace+0x4b/0x740 [ 95.401558] ? __kmalloc_node+0x33/0x70 [ 95.405513] ? __kmalloc_node+0x33/0x70 [ 95.409467] ? rcu_read_lock_sched_held+0x108/0x120 [ 95.414469] __memcg_init_list_lru_node+0x169/0x270 [ 95.419469] ? list_lru_add+0x7c0/0x7c0 [ 95.423425] ? __kmalloc_node+0x47/0x70 [ 95.427388] __list_lru_init+0x544/0x750 [ 95.431434] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 95.437303] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 95.442308] ? lockdep_init_map+0x9/0x10 [ 95.446355] sget_userns+0x6b1/0xe40 [ 95.450049] ? kernfs_sop_show_path+0x190/0x190 [ 95.454709] ? kernfs_sop_show_options+0x180/0x180 [ 95.459618] ? destroy_unused_super.part.6+0xd0/0xd0 [ 95.464713] ? check_same_owner+0x320/0x320 [ 95.469022] ? rcu_pm_notify+0xc0/0xc0 [ 95.472901] ? rcu_read_lock_sched_held+0x108/0x120 [ 95.477894] ? kmem_cache_alloc_trace+0x459/0x740 [ 95.482713] ? lock_downgrade+0x980/0x980 [ 95.486849] kernfs_mount_ns+0x13d/0x8b0 [ 95.490892] ? kernfs_super_ns+0x70/0x70 [ 95.494942] sysfs_mount+0xc2/0x1c0 [ 95.498548] ? sysfs_kill_sb+0x40/0x40 [ 95.502420] ? alloc_pages_current+0xbe/0x1e0 [ 95.506901] ? security_sb_copy_data+0x81/0xb0 [ 95.511464] mount_fs+0x66/0x2d0 [ 95.514815] vfs_kern_mount.part.26+0xc6/0x4a0 [ 95.519376] ? may_umount+0xa0/0xa0 [ 95.522982] ? _raw_read_unlock+0x22/0x30 [ 95.527113] ? __get_fs_type+0x8a/0xc0 [ 95.530988] do_mount+0xea4/0x2bb0 [ 95.534519] ? copy_mount_string+0x40/0x40 [ 95.538731] ? rcu_pm_notify+0xc0/0xc0 [ 95.542606] ? copy_mount_options+0x5f/0x2e0 [ 95.546994] ? rcu_read_lock_sched_held+0x108/0x120 [ 95.551991] ? kmem_cache_alloc_trace+0x459/0x740 [ 95.556826] ? copy_mount_options+0x1f7/0x2e0 [ 95.561304] SyS_mount+0xab/0x120 [ 95.564735] ? copy_mnt_ns+0xb30/0xb30 [ 95.568606] do_syscall_64+0x281/0x940 [ 95.572470] ? vmalloc_sync_all+0x30/0x30 [ 95.576596] ? _raw_spin_unlock_irq+0x27/0x70 [ 95.581073] ? finish_task_switch+0x1c1/0x7e0 [ 95.585551] ? syscall_return_slowpath+0x550/0x550 [ 95.590459] ? syscall_return_slowpath+0x2ac/0x550 [ 95.595368] ? prepare_exit_to_usermode+0x350/0x350 [ 95.600366] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 95.605716] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 95.610546] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 95.615713] RIP: 0033:0x454e79 [ 95.618881] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 95.626571] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 2018/03/31 08:42:50 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004400)=""/161, 0xa1}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 95.633819] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 95.641068] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 95.648317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 95.655564] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a [ 95.678051] 9pnet_virtio: no channels available for device ./file0 [ 95.696066] FAULT_INJECTION: forcing a failure. [ 95.696066] name failslab, interval 1, probability 0, space 0, times 0 [ 95.707336] CPU: 0 PID: 10485 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 95.714601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.723947] Call Trace: [ 95.726540] dump_stack+0x194/0x24d [ 95.730178] ? arch_local_irq_restore+0x53/0x53 [ 95.734853] should_fail+0x8c0/0xa40 [ 95.738565] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/03/31 08:42:50 executing program 2 (fault-call:3 fault-nth:27): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) [ 95.743665] ? lock_downgrade+0x980/0x980 [ 95.747810] ? get_pid_task+0xbc/0x140 [ 95.751694] ? proc_fail_nth_write+0x9b/0x1d0 [ 95.756189] ? map_files_get_link+0x3a0/0x3a0 [ 95.760684] ? find_held_lock+0x35/0x1d0 [ 95.764765] ? check_same_owner+0x320/0x320 [ 95.769088] ? rcu_note_context_switch+0x710/0x710 [ 95.774022] should_failslab+0xec/0x120 [ 95.777999] __kmalloc_track_caller+0x5f/0x760 [ 95.782585] ? strncpy_from_user+0x430/0x430 [ 95.786994] ? strndup_user+0x62/0xb0 [ 95.790801] memdup_user+0x2c/0x90 [ 95.794343] strndup_user+0x62/0xb0 [ 95.797968] SyS_mount+0x3c/0x120 [ 95.801419] ? copy_mnt_ns+0xb30/0xb30 [ 95.805310] do_syscall_64+0x281/0x940 [ 95.809196] ? vmalloc_sync_all+0x30/0x30 [ 95.813342] ? _raw_spin_unlock_irq+0x27/0x70 [ 95.817831] ? finish_task_switch+0x1c1/0x7e0 [ 95.822310] ? syscall_return_slowpath+0x550/0x550 [ 95.827217] ? syscall_return_slowpath+0x2ac/0x550 [ 95.832125] ? prepare_exit_to_usermode+0x350/0x350 [ 95.837123] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 95.842469] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 95.847297] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 95.852465] RIP: 0033:0x454e79 [ 95.855633] RSP: 002b:00007f4d804b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 95.863322] RAX: ffffffffffffffda RBX: 00007f4d804b16d4 RCX: 0000000000454e79 [ 95.870570] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 95.877816] RBP: 000000000072bea0 R08: 0000000020000240 R09: 0000000000000000 [ 95.885065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 95.892311] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000000 [ 95.942681] cgroup: cgroup2: unknown option "äQ Ù3„€ð¬s¨~­~bO6}9¢^ÀÀþ" [ 95.991431] cgroup: cgroup2: unknown option "äQ Ù3„€ð¬s¨~­~bO6}9¢^ÀÀþ" [ 95.991687] FAULT_INJECTION: forcing a failure. [ 95.991687] name failslab, interval 1, probability 0, space 0, times 0 [ 96.009505] CPU: 0 PID: 10511 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 96.016778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.026120] Call Trace: [ 96.028688] dump_stack+0x194/0x24d [ 96.032296] ? arch_local_irq_restore+0x53/0x53 [ 96.036968] should_fail+0x8c0/0xa40 [ 96.040672] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 96.045771] ? kasan_kmalloc+0xad/0xe0 [ 96.049646] ? kmem_cache_alloc_trace+0x136/0x740 [ 96.054470] ? __memcg_init_list_lru_node+0x169/0x270 [ 96.059638] ? __list_lru_init+0x544/0x750 [ 96.063849] ? sget_userns+0x6b1/0xe40 [ 96.067716] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 96.072449] ? do_mount+0xea4/0x2bb0 [ 96.076142] ? SyS_mount+0xab/0x120 [ 96.079747] ? do_syscall_64+0x281/0x940 [ 96.083789] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 96.089134] ? find_held_lock+0x35/0x1d0 [ 96.093192] ? __lock_is_held+0xb6/0x140 [ 96.097247] ? check_same_owner+0x320/0x320 [ 96.101550] ? rcu_note_context_switch+0x710/0x710 [ 96.106462] should_failslab+0xec/0x120 [ 96.110414] kmem_cache_alloc_trace+0x4b/0x740 [ 96.114970] ? __kmalloc_node+0x33/0x70 [ 96.118920] ? __kmalloc_node+0x33/0x70 [ 96.122876] ? rcu_read_lock_sched_held+0x108/0x120 [ 96.127876] __memcg_init_list_lru_node+0x169/0x270 [ 96.132873] ? list_lru_add+0x7c0/0x7c0 [ 96.136823] ? __kmalloc_node+0x47/0x70 [ 96.140780] __list_lru_init+0x544/0x750 [ 96.144820] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 96.150685] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 96.155683] ? lockdep_init_map+0x9/0x10 [ 96.159723] sget_userns+0x6b1/0xe40 [ 96.163417] ? kernfs_sop_show_path+0x190/0x190 [ 96.168070] ? kernfs_sop_show_options+0x180/0x180 [ 96.172978] ? destroy_unused_super.part.6+0xd0/0xd0 [ 96.178069] ? check_same_owner+0x320/0x320 [ 96.182369] ? rcu_pm_notify+0xc0/0xc0 [ 96.186241] ? rcu_read_lock_sched_held+0x108/0x120 [ 96.191234] ? kmem_cache_alloc_trace+0x459/0x740 [ 96.196057] ? lock_downgrade+0x980/0x980 [ 96.200190] kernfs_mount_ns+0x13d/0x8b0 [ 96.204230] ? kernfs_super_ns+0x70/0x70 [ 96.208273] sysfs_mount+0xc2/0x1c0 [ 96.211877] ? sysfs_kill_sb+0x40/0x40 [ 96.215746] ? alloc_pages_current+0xbe/0x1e0 [ 96.220236] ? security_sb_copy_data+0x81/0xb0 [ 96.224796] mount_fs+0x66/0x2d0 [ 96.228143] vfs_kern_mount.part.26+0xc6/0x4a0 [ 96.232701] ? may_umount+0xa0/0xa0 [ 96.236309] ? _raw_read_unlock+0x22/0x30 [ 96.240434] ? __get_fs_type+0x8a/0xc0 [ 96.244320] do_mount+0xea4/0x2bb0 [ 96.247849] ? copy_mount_string+0x40/0x40 [ 96.252065] ? rcu_pm_notify+0xc0/0xc0 [ 96.255935] ? copy_mount_options+0x5f/0x2e0 [ 96.260321] ? rcu_read_lock_sched_held+0x108/0x120 [ 96.265315] ? kmem_cache_alloc_trace+0x459/0x740 [ 96.270144] ? copy_mount_options+0x1f7/0x2e0 [ 96.274621] SyS_mount+0xab/0x120 [ 96.278051] ? copy_mnt_ns+0xb30/0xb30 [ 96.281918] do_syscall_64+0x281/0x940 [ 96.285781] ? vmalloc_sync_all+0x30/0x30 [ 96.289909] ? _raw_spin_unlock_irq+0x27/0x70 [ 96.294382] ? finish_task_switch+0x1c1/0x7e0 [ 96.298853] ? syscall_return_slowpath+0x550/0x550 [ 96.303759] ? syscall_return_slowpath+0x2ac/0x550 [ 96.308664] ? prepare_exit_to_usermode+0x350/0x350 [ 96.313660] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 96.319015] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 96.323860] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 96.329045] RIP: 0033:0x454e79 [ 96.332216] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 08:42:50 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:50 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a76"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:50 executing program 1 (fault-call:4 fault-nth:1): bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:50 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000004c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xf, 0x4, 0x9, 0xc, 0xd, r2, 0x5}, 0x2c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x84) mkdir(&(0x7f0000000600)='./file0\x00', 0x80) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000640)) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000340)) 2018/03/31 08:42:50 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x0, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:50 executing program 2 (fault-call:3 fault-nth:28): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x200, 0x9392, 0x51, 0x0, 0x1}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r1, 0x9, 0x8}, 0xc) [ 96.339901] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 96.347149] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 96.354396] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 96.361642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 96.368902] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b 2018/03/31 08:42:50 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xf, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) [ 96.461840] FAULT_INJECTION: forcing a failure. [ 96.461840] name failslab, interval 1, probability 0, space 0, times 0 [ 96.473132] CPU: 1 PID: 10521 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 96.480404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.489754] Call Trace: [ 96.492340] dump_stack+0x194/0x24d [ 96.495970] ? arch_local_irq_restore+0x53/0x53 [ 96.500634] ? __save_stack_trace+0x7e/0xd0 [ 96.504965] should_fail+0x8c0/0xa40 [ 96.508671] ? trace_event_raw_event_lock+0x340/0x340 [ 96.513848] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 96.518934] ? kasan_kmalloc+0xad/0xe0 [ 96.522805] ? __kmalloc_track_caller+0x15e/0x760 [ 96.527631] ? memdup_user+0x2c/0x90 [ 96.531322] ? strndup_user+0x62/0xb0 [ 96.535100] ? SyS_mount+0x3c/0x120 [ 96.538704] ? proc_fail_nth_write+0x9b/0x1d0 [ 96.543175] ? map_files_get_link+0x3a0/0x3a0 [ 96.547647] ? find_held_lock+0x35/0x1d0 [ 96.551697] ? check_same_owner+0x320/0x320 [ 96.555999] ? rcu_note_context_switch+0x710/0x710 [ 96.560912] ? __check_object_size+0x8b/0x530 [ 96.565385] should_failslab+0xec/0x120 [ 96.569337] __kmalloc_track_caller+0x5f/0x760 [ 96.573897] ? strncpy_from_user+0x430/0x430 [ 96.578281] ? strndup_user+0x62/0xb0 [ 96.582058] ? _copy_from_user+0x99/0x110 [ 96.586190] memdup_user+0x2c/0x90 [ 96.589709] strndup_user+0x62/0xb0 [ 96.593312] SyS_mount+0x6b/0x120 [ 96.596739] ? copy_mnt_ns+0xb30/0xb30 [ 96.600602] do_syscall_64+0x281/0x940 [ 96.604465] ? vmalloc_sync_all+0x30/0x30 [ 96.608591] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 96.614104] ? syscall_return_slowpath+0x550/0x550 [ 96.619012] ? syscall_return_slowpath+0x2ac/0x550 [ 96.623927] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 96.629270] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 96.634090] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 96.639257] RIP: 0033:0x454e79 [ 96.642421] RSP: 002b:00007f4d804b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 96.650106] RAX: ffffffffffffffda RBX: 00007f4d804b16d4 RCX: 0000000000454e79 2018/03/31 08:42:50 executing program 3: r0 = perf_event_open(&(0x7f000054df88)={0x2, 0x78, 0x0, 0x303, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x20000000002, 0x78, 0x0, 0x80000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f000057c000)={0x2, 0x78, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) close(r0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000003c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x3, 0x4, 0x81, 0x3, 0xffffffffffffff9c, 0x4}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f0000000140)}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="95584c24fc37c9bf9e4c32efcf1bd85040dc79a7075888f6ce121e6dc455a2924d26e1ec136ef3c3fac49ecc7931c331a83c1f25df3d9db7c777c3abbe", 0x3d}], 0x1, &(0x7f0000000200)=ANY=[], 0x0, 0x40}, 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)="8e68d7d3eb000000056503000000a6a28e6b96012f403743eadab0f5fec1564a3097cd7f5aa8d977138b83b0ba89ad5100092645c0aec6387bab22f2a37564f8d0e2", 0x0, &(0x7f0000000200)) socketpair(0x15, 0x80003, 0x9, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r2, 0x50, &(0x7f0000000400)}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='squashfs\x00', 0x20, 0x0) [ 96.657353] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 96.664596] RBP: 000000000072bea0 R08: 0000000020000240 R09: 0000000000000000 [ 96.671842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 96.679088] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000001 [ 96.696336] FAULT_INJECTION: forcing a failure. [ 96.696336] name failslab, interval 1, probability 0, space 0, times 0 [ 96.707762] CPU: 0 PID: 10536 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 96.715044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.724398] Call Trace: [ 96.726995] dump_stack+0x194/0x24d [ 96.730634] ? arch_local_irq_restore+0x53/0x53 [ 96.735323] should_fail+0x8c0/0xa40 [ 96.739045] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 96.744157] ? kasan_kmalloc+0xad/0xe0 [ 96.748049] ? kmem_cache_alloc_trace+0x136/0x740 [ 96.752890] ? __memcg_init_list_lru_node+0x169/0x270 [ 96.758060] ? __list_lru_init+0x544/0x750 [ 96.762272] ? sget_userns+0x6b1/0xe40 [ 96.766139] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 96.770874] ? do_mount+0xea4/0x2bb0 [ 96.774565] ? SyS_mount+0xab/0x120 [ 96.778175] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 96.783530] ? find_held_lock+0x35/0x1d0 [ 96.787581] ? __lock_is_held+0xb6/0x140 [ 96.791635] ? check_same_owner+0x320/0x320 [ 96.795940] ? rcu_note_context_switch+0x710/0x710 [ 96.800860] should_failslab+0xec/0x120 [ 96.804815] kmem_cache_alloc_trace+0x4b/0x740 [ 96.809378] ? __kmalloc_node+0x33/0x70 [ 96.813341] __memcg_init_list_lru_node+0x169/0x270 [ 96.818342] ? list_lru_add+0x7c0/0x7c0 [ 96.822294] ? __kmalloc_node+0x47/0x70 [ 96.826255] __list_lru_init+0x544/0x750 [ 96.830304] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 96.836171] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 96.841173] ? lockdep_init_map+0x9/0x10 [ 96.845217] sget_userns+0x6b1/0xe40 [ 96.848911] ? kernfs_sop_show_path+0x190/0x190 [ 96.853563] ? kernfs_sop_show_options+0x180/0x180 [ 96.858471] ? destroy_unused_super.part.6+0xd0/0xd0 [ 96.863565] ? check_same_owner+0x320/0x320 [ 96.867866] ? rcu_pm_notify+0xc0/0xc0 [ 96.871743] ? rcu_read_lock_sched_held+0x108/0x120 [ 96.876738] ? kmem_cache_alloc_trace+0x459/0x740 [ 96.881560] ? lock_downgrade+0x980/0x980 [ 96.885697] kernfs_mount_ns+0x13d/0x8b0 [ 96.889740] ? kernfs_super_ns+0x70/0x70 [ 96.893790] sysfs_mount+0xc2/0x1c0 [ 96.897396] ? sysfs_kill_sb+0x40/0x40 [ 96.901265] ? alloc_pages_current+0xbe/0x1e0 [ 96.905743] ? security_sb_copy_data+0x81/0xb0 [ 96.910310] mount_fs+0x66/0x2d0 [ 96.913659] vfs_kern_mount.part.26+0xc6/0x4a0 [ 96.918221] ? may_umount+0xa0/0xa0 [ 96.921831] ? _raw_read_unlock+0x22/0x30 [ 96.925962] ? __get_fs_type+0x8a/0xc0 [ 96.929834] do_mount+0xea4/0x2bb0 [ 96.933363] ? copy_mount_string+0x40/0x40 [ 96.937575] ? rcu_pm_notify+0xc0/0xc0 [ 96.941453] ? copy_mount_options+0x5f/0x2e0 [ 96.945841] ? rcu_read_lock_sched_held+0x108/0x120 [ 96.950836] ? kmem_cache_alloc_trace+0x459/0x740 [ 96.955670] ? copy_mount_options+0x1f7/0x2e0 [ 96.960168] SyS_mount+0xab/0x120 [ 96.963599] ? copy_mnt_ns+0xb30/0xb30 [ 96.967468] do_syscall_64+0x281/0x940 [ 96.971338] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 96.976853] ? syscall_return_slowpath+0x550/0x550 [ 96.981763] ? syscall_return_slowpath+0x2ac/0x550 [ 96.986762] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 96.992108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 96.996938] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 97.002108] RIP: 0033:0x454e79 [ 97.005276] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 08:42:51 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:51 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a76"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:51 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x0, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) [ 97.012967] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 97.020219] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 97.027466] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 97.034713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 97.041962] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c 2018/03/31 08:42:51 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f00000008c0)={&(0x7f0000000300)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000640)=""/249, 0xf9}, {&(0x7f0000000740)=""/219, 0xdb}, {&(0x7f0000000840)=""/34, 0x22}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000000880)=""/17, 0x11}], 0x5, &(0x7f00000009c0)=""/69, 0x45, 0x4}, 0x40000000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000c00)={r1, &(0x7f0000000a40)="a543dcdfb05ba92ae9fcb9ef112f0c25b229212ad29ce2ae1511f0867f52f7bb6d3f2e9d36832cc62fb0f990480dc485a755be2106d68e0d7aba4908b50541480e5633de069d5798f85d8fb99950bd3dc4d356e41fe20a83e51c2f275dcf6745bd418add89c5881affee3a62079a4d651f116bdd79b259a991c717879ad11d02455af7221ecc3bee1e1365551f5353673d74f368b19b0404cdf48f4bcc6ed2324853c3c9f5e33ce14d00f0feeaa621c0e9b42ea5891cbf59cc25f0ba96431b1e98fe3f", &(0x7f0000000b40)="9cab00f5455e3837dd5fff4db0e5842e88fac4cad94528d512707a5eb8bfecd46d72c03701dae0ce2070a3835b44381073f18d77498cef55266e2e33f0565646bc6003703047cf2b0f81253f89d8d3d475392361e82485c75d8bc8952ef69a5fee856c23d002dea5c916ddfce809df1180b2573cba324a9f22473b89391eb0421d1177b0f92b89b9bdeef7fefe7b5047dd89e2bffd76c898f0c7a3619e0b7b4c69651649e31d8bddf236727e67f71bb7e23913e1"}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:51 executing program 2 (fault-call:3 fault-nth:29): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) [ 97.111216] 9pnet_virtio: no channels available for device ./file0 [ 97.224847] FAULT_INJECTION: forcing a failure. [ 97.224847] name failslab, interval 1, probability 0, space 0, times 0 [ 97.236168] CPU: 1 PID: 10564 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 97.243456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.252807] Call Trace: [ 97.255396] dump_stack+0x194/0x24d [ 97.259030] ? arch_local_irq_restore+0x53/0x53 [ 97.263699] ? __save_stack_trace+0x7e/0xd0 [ 97.268030] should_fail+0x8c0/0xa40 [ 97.271749] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 97.276847] ? kasan_kmalloc+0xad/0xe0 [ 97.280730] ? kmem_cache_alloc_trace+0x136/0x740 [ 97.285570] ? __memcg_init_list_lru_node+0x169/0x270 [ 97.290756] ? __list_lru_init+0x544/0x750 [ 97.294985] ? sget_userns+0x6b1/0xe40 [ 97.298873] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 97.303626] ? do_mount+0xea4/0x2bb0 [ 97.307338] ? SyS_mount+0xab/0x120 [ 97.310972] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 97.316337] ? find_held_lock+0x35/0x1d0 [ 97.320399] ? __lock_is_held+0xb6/0x140 [ 97.324462] ? check_same_owner+0x320/0x320 [ 97.328764] ? rcu_note_context_switch+0x710/0x710 [ 97.333678] should_failslab+0xec/0x120 [ 97.337630] kmem_cache_alloc_trace+0x4b/0x740 [ 97.342186] ? __kmalloc_node+0x33/0x70 [ 97.346136] ? __kmalloc_node+0x33/0x70 [ 97.350085] ? rcu_read_lock_sched_held+0x108/0x120 [ 97.355080] __memcg_init_list_lru_node+0x169/0x270 [ 97.360074] ? list_lru_add+0x7c0/0x7c0 [ 97.364030] ? __kmalloc_node+0x47/0x70 [ 97.367984] __list_lru_init+0x544/0x750 [ 97.372032] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 97.377897] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 97.382895] ? lockdep_init_map+0x9/0x10 [ 97.386936] sget_userns+0x6b1/0xe40 [ 97.390627] ? kernfs_sop_show_path+0x190/0x190 [ 97.395272] ? kernfs_sop_show_options+0x180/0x180 [ 97.400180] ? destroy_unused_super.part.6+0xd0/0xd0 [ 97.405265] ? check_same_owner+0x320/0x320 [ 97.409565] ? rcu_pm_notify+0xc0/0xc0 [ 97.413436] ? rcu_read_lock_sched_held+0x108/0x120 [ 97.418430] ? kmem_cache_alloc_trace+0x459/0x740 [ 97.423249] ? lock_downgrade+0x980/0x980 [ 97.427376] kernfs_mount_ns+0x13d/0x8b0 [ 97.431417] ? kernfs_super_ns+0x70/0x70 [ 97.435460] sysfs_mount+0xc2/0x1c0 [ 97.439064] ? sysfs_kill_sb+0x40/0x40 [ 97.442928] ? alloc_pages_current+0xbe/0x1e0 [ 97.447399] ? security_sb_copy_data+0x81/0xb0 [ 97.451963] mount_fs+0x66/0x2d0 [ 97.455307] vfs_kern_mount.part.26+0xc6/0x4a0 [ 97.459864] ? may_umount+0xa0/0xa0 [ 97.463465] ? _raw_read_unlock+0x22/0x30 [ 97.467590] ? __get_fs_type+0x8a/0xc0 [ 97.471457] do_mount+0xea4/0x2bb0 [ 97.474975] ? copy_mount_string+0x40/0x40 [ 97.479183] ? rcu_pm_notify+0xc0/0xc0 [ 97.483051] ? copy_mount_options+0x5f/0x2e0 [ 97.487434] ? rcu_read_lock_sched_held+0x108/0x120 [ 97.492426] ? kmem_cache_alloc_trace+0x459/0x740 [ 97.497249] ? copy_mount_options+0x1f7/0x2e0 [ 97.501722] SyS_mount+0xab/0x120 [ 97.505148] ? copy_mnt_ns+0xb30/0xb30 [ 97.509015] do_syscall_64+0x281/0x940 [ 97.512880] ? vmalloc_sync_all+0x30/0x30 [ 97.517002] ? _raw_spin_unlock_irq+0x27/0x70 [ 97.521478] ? finish_task_switch+0x1c1/0x7e0 [ 97.525950] ? syscall_return_slowpath+0x550/0x550 [ 97.530856] ? syscall_return_slowpath+0x2ac/0x550 [ 97.535760] ? prepare_exit_to_usermode+0x350/0x350 [ 97.540750] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 97.546093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 97.550914] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 97.556079] RIP: 0033:0x454e79 [ 97.559244] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 97.566930] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 2018/03/31 08:42:51 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xf, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:51 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}], 0x4, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 97.574175] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 97.581419] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 97.588664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 97.595909] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d 2018/03/31 08:42:52 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 97.659169] 9pnet_virtio: no channels available for device ./file0 [ 97.661145] EXT4-fs (sda1): re-mounted. Opts: (null) 2018/03/31 08:42:52 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xf, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @alu={0x7, 0x7966, 0x0, 0x9, 0x5, 0x0, 0xffffffffffffffff}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:52 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x400000000000004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r0, r2}) perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x4, 0x6, 0x5, 0xffffffffffffffff, 0x0, 0x401, 0x800, 0x2, 0x7, 0x5, 0x5, 0x0, 0x4, 0x31, 0x40, 0x0, 0x2, 0x7, 0x3, 0x4, 0x5, 0x9, 0x1, 0x0, 0x3, 0xffffffffffffffff, 0x7, 0x7, 0x4, 0xf9ec, 0x1, 0x6, 0x1ff, 0x2, 0x3ff, 0x9, 0x0, 0x8, 0x0, @perf_config_ext={0x344, 0x7}, 0x20100, 0x8, 0x5, 0x6, 0x6, 0x36fd}, 0x0, 0x5, r2, 0x3) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x3) close(r3) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) recvmsg(r3, &(0x7f0000001c80)={&(0x7f0000000980)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000a00)=""/203, 0xcb}, {&(0x7f0000000b00)}, {&(0x7f0000000b40)=""/33, 0x21}, {&(0x7f0000000b80)=""/49, 0x31}, {&(0x7f0000000bc0)=""/50, 0x32}], 0x5, &(0x7f0000000c80)=""/4096, 0x1000, 0x20}, 0x120) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="8500000000000000257a0000002000009500000000000007"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r4}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r2, 0x0, 0x2}, 0x14) r5 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r3, &(0x7f0000948000)={0x0, 0x0, &(0x7f00005dc000)=[{&(0x7f0000d43000), 0xffffff1b}], 0x1, &(0x7f0000d43000)}, 0x0) recvmsg(r5, &(0x7f0000005000)={&(0x7f0000003980)=@can={0x0, 0x0}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000003a00)=""/174, 0xae}, {&(0x7f0000003ac0)=""/67, 0x43}, {&(0x7f0000003b40)=""/201, 0xc9}, {&(0x7f0000003c40)=""/170, 0xaa}, {&(0x7f0000003d00)=""/111, 0x6f}, {&(0x7f0000003d80)=""/61, 0x3d}, {&(0x7f0000003dc0)=""/196, 0xc4}, {&(0x7f0000003ec0)=""/91, 0x5b}], 0x8, 0x0, 0x0, 0x2}, 0x40002040) bpf$PROG_LOAD(0x5, &(0x7f0000005040)={0xf, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@call={0x85, 0x0, 0x0, 0x1f}, @exit={0x95}, @jmp={0x5, 0x8, 0xf, 0x0, 0x6, 0x8, 0xfffffffffffffffd}, @jmp={0x5, 0x3, 0x5, 0x7, 0x5, 0xfffffffc, 0x1}, @call={0x85, 0x0, 0x0, 0x17}], {0x95}}, &(0x7f0000000240)='syzkaller\x00', 0xcd34, 0xba, &(0x7f0000000280)=""/186, 0x40f00, 0x1, [], r6}, 0x48) sendmsg$kcm(r3, &(0x7f0000013100)={&(0x7f000000fe00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x80, &(0x7f0000000140), 0x0, &(0x7f000000ff80)}, 0x4084) close(r5) 2018/03/31 08:42:52 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) [ 97.801322] EXT4-fs (sda1): re-mounted. Opts: (null) 2018/03/31 08:42:52 executing program 1 (fault-call:4 fault-nth:2): bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:52 executing program 2 (fault-call:3 fault-nth:30): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:52 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:52 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r2, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000002c0)) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x100000001) 2018/03/31 08:42:52 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x0, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) [ 97.871589] FAULT_INJECTION: forcing a failure. [ 97.871589] name failslab, interval 1, probability 0, space 0, times 0 [ 97.882940] CPU: 0 PID: 10593 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 97.890218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.899558] Call Trace: [ 97.902133] dump_stack+0x194/0x24d [ 97.905746] ? arch_local_irq_restore+0x53/0x53 [ 97.910407] should_fail+0x8c0/0xa40 [ 97.914107] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 97.919192] ? kasan_kmalloc+0xad/0xe0 [ 97.923058] ? kmem_cache_alloc_trace+0x136/0x740 [ 97.927884] ? __memcg_init_list_lru_node+0x169/0x270 [ 97.933051] ? __list_lru_init+0x544/0x750 [ 97.937264] ? sget_userns+0x6b1/0xe40 [ 97.941135] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 97.945867] ? do_mount+0xea4/0x2bb0 [ 97.949561] ? SyS_mount+0xab/0x120 [ 97.953170] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 97.958521] ? find_held_lock+0x35/0x1d0 [ 97.962568] ? __lock_is_held+0xb6/0x140 [ 97.966623] ? check_same_owner+0x320/0x320 [ 97.970928] ? rcu_note_context_switch+0x710/0x710 [ 97.975846] should_failslab+0xec/0x120 [ 97.979801] kmem_cache_alloc_trace+0x4b/0x740 [ 97.984362] ? __kmalloc_node+0x33/0x70 [ 97.988318] ? __kmalloc_node+0x33/0x70 [ 97.992275] ? rcu_read_lock_sched_held+0x108/0x120 [ 97.997277] __memcg_init_list_lru_node+0x169/0x270 [ 98.002276] ? list_lru_add+0x7c0/0x7c0 [ 98.006230] ? __kmalloc_node+0x47/0x70 [ 98.010193] __list_lru_init+0x544/0x750 [ 98.014241] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 98.020108] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 98.025111] ? lockdep_init_map+0x9/0x10 [ 98.029153] sget_userns+0x6b1/0xe40 [ 98.032844] ? kernfs_sop_show_path+0x190/0x190 [ 98.037496] ? kernfs_sop_show_options+0x180/0x180 [ 98.042406] ? destroy_unused_super.part.6+0xd0/0xd0 [ 98.047501] ? check_same_owner+0x320/0x320 [ 98.051804] ? rcu_pm_notify+0xc0/0xc0 [ 98.055680] ? rcu_read_lock_sched_held+0x108/0x120 [ 98.060673] ? kmem_cache_alloc_trace+0x459/0x740 [ 98.065496] ? lock_downgrade+0x980/0x980 [ 98.069633] kernfs_mount_ns+0x13d/0x8b0 [ 98.073680] ? kernfs_super_ns+0x70/0x70 [ 98.077728] sysfs_mount+0xc2/0x1c0 [ 98.081334] ? sysfs_kill_sb+0x40/0x40 [ 98.085203] ? alloc_pages_current+0xbe/0x1e0 [ 98.089683] ? security_sb_copy_data+0x81/0xb0 [ 98.094245] mount_fs+0x66/0x2d0 [ 98.097598] vfs_kern_mount.part.26+0xc6/0x4a0 [ 98.102162] ? may_umount+0xa0/0xa0 [ 98.105769] ? _raw_read_unlock+0x22/0x30 [ 98.109899] ? __get_fs_type+0x8a/0xc0 [ 98.113773] do_mount+0xea4/0x2bb0 [ 98.117309] ? copy_mount_string+0x40/0x40 [ 98.121524] ? rcu_pm_notify+0xc0/0xc0 [ 98.125401] ? copy_mount_options+0x5f/0x2e0 [ 98.129789] ? rcu_read_lock_sched_held+0x108/0x120 [ 98.134785] ? kmem_cache_alloc_trace+0x459/0x740 [ 98.139608] ? kasan_check_write+0x14/0x20 [ 98.143828] ? copy_mount_options+0x1f7/0x2e0 [ 98.148307] SyS_mount+0xab/0x120 [ 98.151739] ? copy_mnt_ns+0xb30/0xb30 [ 98.155609] do_syscall_64+0x281/0x940 [ 98.159475] ? vmalloc_sync_all+0x30/0x30 [ 98.163604] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 98.169119] ? syscall_return_slowpath+0x550/0x550 [ 98.174031] ? syscall_return_slowpath+0x2ac/0x550 [ 98.178948] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 98.184293] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 98.189119] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 98.194285] RIP: 0033:0x454e79 [ 98.197452] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 98.205144] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 98.212393] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 98.219642] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 98.226892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 98.234139] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e [ 98.255675] FAULT_INJECTION: forcing a failure. [ 98.255675] name failslab, interval 1, probability 0, space 0, times 0 [ 98.266965] CPU: 0 PID: 10597 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 98.274230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.283576] Call Trace: [ 98.286157] dump_stack+0x194/0x24d [ 98.289786] ? arch_local_irq_restore+0x53/0x53 [ 98.294458] should_fail+0x8c0/0xa40 [ 98.298154] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 98.303234] ? __kmalloc_track_caller+0x15e/0x760 [ 98.308055] ? strndup_user+0x62/0xb0 [ 98.311831] ? SyS_mount+0x6b/0x120 [ 98.315439] ? trace_hardirqs_off+0x10/0x10 [ 98.319739] ? proc_fail_nth_write+0x9b/0x1d0 [ 98.324210] ? map_files_get_link+0x3a0/0x3a0 [ 98.328691] ? find_held_lock+0x35/0x1d0 [ 98.332750] ? check_same_owner+0x320/0x320 [ 98.337051] ? lock_release+0xa40/0xa40 [ 98.341005] ? rcu_note_context_switch+0x710/0x710 [ 98.345924] should_failslab+0xec/0x120 [ 98.349876] kmem_cache_alloc_trace+0x4b/0x740 [ 98.354442] ? kasan_check_write+0x14/0x20 [ 98.358656] ? _copy_from_user+0x99/0x110 [ 98.362788] copy_mount_options+0x5f/0x2e0 [ 98.367007] SyS_mount+0x87/0x120 [ 98.370454] ? copy_mnt_ns+0xb30/0xb30 [ 98.374325] do_syscall_64+0x281/0x940 [ 98.378189] ? vmalloc_sync_all+0x30/0x30 [ 98.382315] ? _raw_spin_unlock_irq+0x27/0x70 [ 98.386791] ? finish_task_switch+0x1c1/0x7e0 [ 98.391269] ? syscall_return_slowpath+0x550/0x550 [ 98.396178] ? syscall_return_slowpath+0x2ac/0x550 [ 98.401090] ? prepare_exit_to_usermode+0x350/0x350 [ 98.406087] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 98.411433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 98.416258] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/31 08:42:52 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:52 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000c980)={&(0x7f000000c4c0)=@can={0x0, 0x0}, 0x80, &(0x7f000000c8c0)=[{&(0x7f000000c540)=""/170, 0xaa}, {&(0x7f000000c600)=""/208, 0xd0}, {&(0x7f000000c700)=""/184, 0xb8}, {&(0x7f000000c7c0)=""/224, 0xe0}], 0x4, &(0x7f000000c900)=""/91, 0x5b, 0x1000}, 0x60) bpf$PROG_LOAD(0x5, &(0x7f000000c9c0)={0x7, 0x14, &(0x7f0000000640)=@raw=[@alu={0x0, 0x0, 0x6, 0x0, 0xf, 0x30, 0x1}, @call={0x85, 0x0, 0x0, 0x30}, @jmp={0x5, 0x3, 0x0, 0x5, 0x0, 0x1}, @generic={0x2, 0x6, 0xc5e, 0x7f}, @exit={0x95}, @ldst={0x3, 0x1, 0x6, 0x3, 0x7, 0x1, 0x11}, @alu={0x7, 0x300, 0x6, 0x0, 0xd, 0x100, 0x18}, @alu={0x0, 0x3, 0x1, 0x1, 0xf, 0x20, 0x14}, @ldst={0x3, 0x2, 0x1, 0xe, 0x0, 0x30, 0x10}, @exit={0x95}], &(0x7f0000000340)='GPL\x00', 0x3ff, 0xf, &(0x7f0000000700)=""/15, 0x41100, 0x0, [], r3}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', r2}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) [ 98.421424] RIP: 0033:0x454e79 [ 98.424591] RSP: 002b:00007f4d804b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 98.432277] RAX: ffffffffffffffda RBX: 00007f4d804b16d4 RCX: 0000000000454e79 [ 98.439523] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 98.446768] RBP: 000000000072bea0 R08: 0000000020000240 R09: 0000000000000000 [ 98.454020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 98.461269] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000002 2018/03/31 08:42:52 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x0, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:52 executing program 2 (fault-call:3 fault-nth:31): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:52 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB='\x00\x00\x00']) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file0/file0\x00', 0x0, 0x18}, 0xffffff45) socketpair(0x11, 0x0, 0x81, &(0x7f0000000580)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r2}, 0x48) mkdir(&(0x7f0000000000)='./file1\x00', 0x168) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=ANY=[@ANYBLOB="c0000000000000002b010000010000007f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30375c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237250cae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e380000"], 0xc0}, 0x20004000) [ 98.532636] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:52 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xf, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:52 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 98.631938] FAULT_INJECTION: forcing a failure. [ 98.631938] name failslab, interval 1, probability 0, space 0, times 0 [ 98.643277] CPU: 0 PID: 10626 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 98.650558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.659916] Call Trace: [ 98.662509] dump_stack+0x194/0x24d [ 98.666144] ? arch_local_irq_restore+0x53/0x53 [ 98.670836] should_fail+0x8c0/0xa40 [ 98.674558] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/03/31 08:42:53 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 98.679663] ? kasan_kmalloc+0xad/0xe0 [ 98.683557] ? kmem_cache_alloc_trace+0x136/0x740 [ 98.688395] ? __memcg_init_list_lru_node+0x169/0x270 [ 98.693565] ? __list_lru_init+0x544/0x750 [ 98.697776] ? sget_userns+0x6b1/0xe40 [ 98.701643] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 98.706377] ? do_mount+0xea4/0x2bb0 [ 98.710067] ? SyS_mount+0xab/0x120 [ 98.713671] ? do_syscall_64+0x281/0x940 [ 98.717710] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 98.723058] ? find_held_lock+0x35/0x1d0 [ 98.727101] ? __lock_is_held+0xb6/0x140 [ 98.731155] ? check_same_owner+0x320/0x320 [ 98.735457] ? rcu_note_context_switch+0x710/0x710 [ 98.740372] should_failslab+0xec/0x120 [ 98.744327] kmem_cache_alloc_trace+0x4b/0x740 [ 98.748886] ? __kmalloc_node+0x33/0x70 [ 98.752841] ? __kmalloc_node+0x33/0x70 [ 98.756793] ? rcu_read_lock_sched_held+0x108/0x120 [ 98.761793] __memcg_init_list_lru_node+0x169/0x270 [ 98.766793] ? list_lru_add+0x7c0/0x7c0 [ 98.770747] ? __kmalloc_node+0x47/0x70 [ 98.774713] __list_lru_init+0x544/0x750 [ 98.778757] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 98.784623] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 98.789626] ? lockdep_init_map+0x9/0x10 [ 98.793668] sget_userns+0x6b1/0xe40 [ 98.797360] ? kernfs_sop_show_path+0x190/0x190 [ 98.802022] ? kernfs_sop_show_options+0x180/0x180 [ 98.806931] ? destroy_unused_super.part.6+0xd0/0xd0 [ 98.812029] ? check_same_owner+0x320/0x320 [ 98.816334] ? rcu_pm_notify+0xc0/0xc0 [ 98.820212] ? rcu_read_lock_sched_held+0x108/0x120 [ 98.825204] ? kmem_cache_alloc_trace+0x459/0x740 [ 98.830028] ? lock_downgrade+0x980/0x980 [ 98.834165] kernfs_mount_ns+0x13d/0x8b0 [ 98.838206] ? kernfs_super_ns+0x70/0x70 [ 98.842252] sysfs_mount+0xc2/0x1c0 [ 98.845861] ? sysfs_kill_sb+0x40/0x40 [ 98.849731] ? alloc_pages_current+0xbe/0x1e0 [ 98.854209] ? security_sb_copy_data+0x81/0xb0 [ 98.858770] mount_fs+0x66/0x2d0 [ 98.862118] vfs_kern_mount.part.26+0xc6/0x4a0 [ 98.866681] ? may_umount+0xa0/0xa0 [ 98.870289] ? _raw_read_unlock+0x22/0x30 [ 98.874415] ? __get_fs_type+0x8a/0xc0 [ 98.878284] do_mount+0xea4/0x2bb0 [ 98.881809] ? copy_mount_string+0x40/0x40 [ 98.886030] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 98.891032] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 98.895772] ? retint_kernel+0x10/0x10 [ 98.899642] ? copy_mount_options+0x18b/0x2e0 [ 98.904118] ? __sanitizer_cov_trace_pc+0x3f/0x50 [ 98.908938] ? copy_mount_options+0x1f7/0x2e0 [ 98.913416] SyS_mount+0xab/0x120 [ 98.916850] ? copy_mnt_ns+0xb30/0xb30 [ 98.920716] do_syscall_64+0x281/0x940 [ 98.924579] ? vmalloc_sync_all+0x30/0x30 [ 98.928702] ? _raw_spin_unlock_irq+0x27/0x70 [ 98.933174] ? finish_task_switch+0x1c1/0x7e0 [ 98.937648] ? syscall_return_slowpath+0x550/0x550 [ 98.942555] ? syscall_return_slowpath+0x2ac/0x550 [ 98.947465] ? prepare_exit_to_usermode+0x350/0x350 [ 98.952460] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 98.957810] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 98.962636] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 98.967808] RIP: 0033:0x454e79 [ 98.970976] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 98.978663] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 98.985910] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 98.993155] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 99.000403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 99.007653] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001f 2018/03/31 08:42:53 executing program 1 (fault-call:4 fault-nth:3): bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:53 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:53 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 99.068799] 9pnet_virtio: no channels available for device ./file0 [ 99.251799] FAULT_INJECTION: forcing a failure. [ 99.251799] name failslab, interval 1, probability 0, space 0, times 0 [ 99.263161] CPU: 0 PID: 10656 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 99.270432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.279796] Call Trace: [ 99.282680] dump_stack+0x194/0x24d [ 99.286282] ? arch_local_irq_restore+0x53/0x53 [ 99.290944] should_fail+0x8c0/0xa40 [ 99.294649] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 99.299727] ? lock_release+0xa40/0xa40 [ 99.303676] ? unwind_dump+0x4d0/0x4d0 [ 99.307537] ? find_held_lock+0x35/0x1d0 [ 99.311576] ? check_same_owner+0x320/0x320 [ 99.315873] ? rcu_note_context_switch+0x710/0x710 [ 99.320790] should_failslab+0xec/0x120 [ 99.324745] kmem_cache_alloc+0x47/0x760 [ 99.328783] ? map_files_get_link+0x3a0/0x3a0 [ 99.333253] getname_flags+0xcb/0x580 [ 99.337037] user_path_at_empty+0x2d/0x50 [ 99.341160] do_mount+0x15f/0x2bb0 [ 99.344681] ? copy_mount_string+0x40/0x40 [ 99.348887] ? rcu_pm_notify+0xc0/0xc0 [ 99.352748] ? copy_mount_options+0x5f/0x2e0 [ 99.357126] ? rcu_read_lock_sched_held+0x108/0x120 [ 99.362113] ? kmem_cache_alloc_trace+0x459/0x740 [ 99.366930] ? kasan_check_write+0x14/0x20 [ 99.371143] ? _copy_from_user+0x99/0x110 [ 99.375264] ? copy_mount_options+0x1f7/0x2e0 [ 99.379734] SyS_mount+0xab/0x120 [ 99.383158] ? copy_mnt_ns+0xb30/0xb30 [ 99.387026] do_syscall_64+0x281/0x940 [ 99.390886] ? vmalloc_sync_all+0x30/0x30 [ 99.395009] ? _raw_spin_unlock_irq+0x27/0x70 [ 99.399486] ? finish_task_switch+0x1c1/0x7e0 [ 99.403954] ? syscall_return_slowpath+0x550/0x550 [ 99.408853] ? syscall_return_slowpath+0x2ac/0x550 [ 99.413753] ? prepare_exit_to_usermode+0x350/0x350 [ 99.418744] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 99.424081] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 99.428896] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 99.434057] RIP: 0033:0x454e79 [ 99.437220] RSP: 002b:00007f4d804b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 99.444897] RAX: ffffffffffffffda RBX: 00007f4d804b16d4 RCX: 0000000000454e79 2018/03/31 08:42:53 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xf, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:53 executing program 2 (fault-call:3 fault-nth:32): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) 2018/03/31 08:42:53 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) r2 = gettid() perf_event_open(&(0x7f0000000640)={0x7, 0x70, 0xfffffffffffffffb, 0x1, 0x7f, 0x1f, 0x0, 0x4, 0x0, 0x4, 0x80, 0x9, 0x0, 0xfffffffffffffffb, 0x6, 0x1, 0x7, 0x7fffffff, 0x7, 0xff, 0x9, 0x1f, 0xfffffffffffffffe, 0x7, 0x7, 0x401, 0xde7, 0xfffffffffffffff8, 0x3, 0x1f, 0x100, 0x3, 0x80000000, 0x1000, 0xc8b1, 0x6, 0x2, 0x200000000, 0x0, 0x400, 0x5, @perf_bp={&(0x7f0000000300), 0x8}, 0x0, 0x2, 0x9, 0x5, 0x1, 0x6, 0xfca}, r2, 0x8, r0, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) mkdir(&(0x7f00000002c0)='./file0\x00', 0x30) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000004c0)={r3}) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:53 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = getpid() perf_event_open(&(0x7f00000016c0)={0x1, 0x70, 0x8, 0x1, 0xaf3, 0x2, 0x0, 0x1, 0x10, 0x8, 0xb3, 0x1, 0x0, 0x6, 0xffffffff, 0x5, 0x2, 0x2, 0x8, 0x1f, 0x101, 0x81, 0x6, 0xac, 0xb8, 0x3f, 0x9, 0xc100000000000000, 0x0, 0x1, 0x0, 0x5, 0x9, 0x1000, 0x3ff, 0xff, 0x10001, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x3, 0x8}, 0x2810, 0x38d485fa, 0x88, 0x1, 0x81, 0x2, 0x3}, r1, 0xd, r0, 0x2) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0)=@pppoe={0x0, 0x0, {0x0, @local}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000280)=""/192, 0xc0}], 0x1, &(0x7f0000000340)=""/202, 0xca, 0x3}, 0x1) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={r3, 0x50, &(0x7f0000001740)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001800)=r4, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000240)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0xe, 0xb0f, 0x2, 0x95, 0x10, 0x1, 0xd779}, 0x2c) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x0, 0x10}, 0x10) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x40, 0x8}, 0xc) recvmsg$kcm(r2, &(0x7f0000007e80)={&(0x7f0000007c00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000007e40)=[{&(0x7f0000007c80)=""/132, 0x84}, {&(0x7f0000007d40)=""/19, 0x13}, {&(0x7f0000007d80)=""/136, 0x88}], 0x3, 0x0, 0x0, 0x3}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000007ec0)={0x5, 0xe, &(0x7f0000000600)=@raw=[@generic={0x80, 0x6, 0x1, 0x69f}, @map={0x18, 0xf, 0x1, 0x0, r5}, @generic={0x4, 0x6, 0xffffffffffffff22, 0x80}, @map={0x18, 0x4, 0x1, 0x0, r6}, @map={0x18, 0xf, 0x1, 0x0, r7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5d60, 0x0, 0x0, 0x0, 0x80000001}, @jmp={0x5, 0x6, 0xf, 0x1, 0x7, 0x0, 0xffffffffffffffff}], &(0x7f0000000680)='GPL\x00', 0xfff, 0x1000, &(0x7f00000006c0)=""/4096, 0x0, 0x1, [], r8}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x2e, &(0x7f0000000440), &(0x7f0000000140)=""/46, 0x4229}, 0x28) r9 = gettid() perf_event_open(&(0x7f0000000480)={0x2, 0x70, 0x58b, 0x800, 0x100, 0x9, 0x0, 0x1, 0x10, 0x0, 0x800, 0x6e, 0x35a6, 0x6, 0x7, 0xffff, 0x0, 0xfffffffffffffffa, 0x1ff, 0x1, 0x0, 0x8, 0x3, 0xffffffffffff0000, 0x8000, 0x101, 0x6, 0x4, 0x401, 0xfffffffffffffffe, 0x3, 0xfff, 0x101, 0x9, 0x6, 0x0, 0x40, 0x100000001, 0x0, 0x6, 0x1, @perf_config_ext={0x8, 0x3f}, 0x0, 0x2, 0x3d7b, 0x4, 0x1ff, 0xcf, 0x6e}, r9, 0xb, r0, 0x8) 2018/03/31 08:42:53 executing program 1 (fault-call:4 fault-nth:4): bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) 2018/03/31 08:42:53 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x0, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:53 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x0, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:53 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x0, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) [ 99.452138] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 99.459380] RBP: 000000000072bea0 R08: 0000000020000240 R09: 0000000000000000 [ 99.466620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 99.473861] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000003 [ 99.544645] FAULT_INJECTION: forcing a failure. [ 99.544645] name failslab, interval 1, probability 0, space 0, times 0 [ 99.555922] CPU: 1 PID: 10668 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 99.563189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.572538] Call Trace: [ 99.575123] dump_stack+0x194/0x24d [ 99.578235] FAULT_INJECTION: forcing a failure. [ 99.578235] name failslab, interval 1, probability 0, space 0, times 0 [ 99.578749] ? arch_local_irq_restore+0x53/0x53 [ 99.594571] ? __save_stack_trace+0x7e/0xd0 [ 99.598885] should_fail+0x8c0/0xa40 [ 99.602584] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 99.607669] ? kasan_kmalloc+0xad/0xe0 [ 99.611540] ? kmem_cache_alloc_trace+0x136/0x740 [ 99.616365] ? __memcg_init_list_lru_node+0x169/0x270 [ 99.621537] ? __list_lru_init+0x544/0x750 [ 99.625751] ? sget_userns+0x6b1/0xe40 [ 99.629620] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 99.634353] ? do_mount+0xea4/0x2bb0 [ 99.638047] ? SyS_mount+0xab/0x120 [ 99.641660] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 99.647012] ? find_held_lock+0x35/0x1d0 [ 99.651060] ? __lock_is_held+0xb6/0x140 [ 99.655111] ? check_same_owner+0x320/0x320 [ 99.659415] ? rcu_note_context_switch+0x710/0x710 [ 99.664329] should_failslab+0xec/0x120 [ 99.668284] kmem_cache_alloc_trace+0x4b/0x740 [ 99.672848] ? __kmalloc_node+0x33/0x70 [ 99.676804] ? __kmalloc_node+0x33/0x70 [ 99.680762] ? rcu_read_lock_sched_held+0x108/0x120 [ 99.685765] __memcg_init_list_lru_node+0x169/0x270 [ 99.690765] ? list_lru_add+0x7c0/0x7c0 [ 99.694719] ? __kmalloc_node+0x47/0x70 [ 99.698682] __list_lru_init+0x544/0x750 [ 99.702731] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 99.708600] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 99.713600] ? lockdep_init_map+0x9/0x10 [ 99.717645] sget_userns+0x6b1/0xe40 [ 99.721340] ? kernfs_sop_show_path+0x190/0x190 [ 99.725994] ? kernfs_sop_show_options+0x180/0x180 [ 99.730906] ? destroy_unused_super.part.6+0xd0/0xd0 [ 99.735999] ? check_same_owner+0x320/0x320 [ 99.740305] ? rcu_pm_notify+0xc0/0xc0 [ 99.744183] ? rcu_read_lock_sched_held+0x108/0x120 [ 99.749183] ? kmem_cache_alloc_trace+0x459/0x740 [ 99.754011] ? lock_downgrade+0x980/0x980 [ 99.758152] kernfs_mount_ns+0x13d/0x8b0 [ 99.762196] ? kernfs_super_ns+0x70/0x70 [ 99.766251] sysfs_mount+0xc2/0x1c0 [ 99.769859] ? sysfs_kill_sb+0x40/0x40 [ 99.773728] ? alloc_pages_current+0xbe/0x1e0 [ 99.778206] ? security_sb_copy_data+0x81/0xb0 [ 99.782772] mount_fs+0x66/0x2d0 [ 99.786122] vfs_kern_mount.part.26+0xc6/0x4a0 [ 99.790684] ? may_umount+0xa0/0xa0 [ 99.794294] ? _raw_read_unlock+0x22/0x30 [ 99.798422] ? __get_fs_type+0x8a/0xc0 [ 99.802292] do_mount+0xea4/0x2bb0 [ 99.805820] ? copy_mount_string+0x40/0x40 [ 99.810036] ? rcu_pm_notify+0xc0/0xc0 [ 99.813912] ? copy_mount_options+0x5f/0x2e0 [ 99.818299] ? rcu_read_lock_sched_held+0x108/0x120 [ 99.823294] ? kmem_cache_alloc_trace+0x459/0x740 [ 99.828118] ? kasan_check_write+0x14/0x20 [ 99.832336] ? _copy_from_user+0x99/0x110 [ 99.836470] ? copy_mount_options+0x1f7/0x2e0 [ 99.840947] SyS_mount+0xab/0x120 [ 99.844384] ? copy_mnt_ns+0xb30/0xb30 [ 99.848258] do_syscall_64+0x281/0x940 [ 99.852128] ? vmalloc_sync_all+0x30/0x30 [ 99.856257] ? _raw_spin_unlock_irq+0x27/0x70 [ 99.860734] ? finish_task_switch+0x1c1/0x7e0 [ 99.865214] ? syscall_return_slowpath+0x550/0x550 [ 99.870125] ? syscall_return_slowpath+0x2ac/0x550 [ 99.875036] ? prepare_exit_to_usermode+0x350/0x350 [ 99.880036] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 99.885382] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 99.890214] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 99.895387] RIP: 0033:0x454e79 [ 99.898561] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 99.906254] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 99.913507] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 99.920759] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 99.928008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 99.935261] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000020 2018/03/31 08:42:54 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x0, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 99.942530] CPU: 0 PID: 10680 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 99.949794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.959135] Call Trace: [ 99.961703] dump_stack+0x194/0x24d [ 99.965310] ? arch_local_irq_restore+0x53/0x53 [ 99.969962] should_fail+0x8c0/0xa40 [ 99.973654] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 99.978742] ? is_bpf_text_address+0xa4/0x120 [ 99.983215] ? find_held_lock+0x35/0x1d0 [ 99.987265] ? check_same_owner+0x320/0x320 [ 99.991562] ? putname+0xee/0x130 [ 99.994988] ? filename_lookup+0x315/0x500 [ 99.999202] ? user_path_at_empty+0x40/0x50 [ 100.003500] ? rcu_note_context_switch+0x710/0x710 [ 100.008405] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 100.013751] should_failslab+0xec/0x120 [ 100.017702] kmem_cache_alloc+0x47/0x760 [ 100.021744] ? perf_trace_lock+0xd6/0x900 [ 100.025869] ? perf_trace_lock_acquire+0xe3/0x980 [ 100.030686] ? free_obj_work+0x690/0x690 [ 100.034725] alloc_vfsmnt+0xe0/0x9c0 [ 100.038415] ? path_lookupat+0x238/0xba0 [ 100.042450] ? mnt_free_id.isra.21+0x50/0x50 [ 100.046837] ? trace_hardirqs_off+0x10/0x10 [ 100.051135] ? putname+0xee/0x130 [ 100.054565] ? rcu_read_lock_sched_held+0x108/0x120 [ 100.059559] ? find_held_lock+0x35/0x1d0 [ 100.063598] ? __get_fs_type+0x8a/0xc0 [ 100.067461] ? lock_downgrade+0x980/0x980 [ 100.071586] ? module_unload_free+0x5b0/0x5b0 [ 100.076055] ? lock_release+0xa40/0xa40 [ 100.080005] ? mpi_resize+0x200/0x200 [ 100.083788] vfs_kern_mount.part.26+0x84/0x4a0 [ 100.088347] ? may_umount+0xa0/0xa0 [ 100.091946] ? _raw_read_unlock+0x22/0x30 [ 100.096068] ? __get_fs_type+0x8a/0xc0 [ 100.099936] do_mount+0xea4/0x2bb0 [ 100.103456] ? copy_mount_string+0x40/0x40 [ 100.107663] ? rcu_pm_notify+0xc0/0xc0 [ 100.111531] ? copy_mount_options+0x5f/0x2e0 [ 100.115922] ? rcu_read_lock_sched_held+0x108/0x120 [ 100.120915] ? kmem_cache_alloc_trace+0x459/0x740 [ 100.125735] ? kasan_check_write+0x14/0x20 [ 100.129946] ? _copy_from_user+0x99/0x110 [ 100.134072] ? copy_mount_options+0x1f7/0x2e0 [ 100.138546] SyS_mount+0xab/0x120 [ 100.141973] ? copy_mnt_ns+0xb30/0xb30 [ 100.145840] do_syscall_64+0x281/0x940 [ 100.149704] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 100.155226] ? syscall_return_slowpath+0x550/0x550 [ 100.160129] ? syscall_return_slowpath+0x2ac/0x550 [ 100.165041] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 100.170381] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 100.175201] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 100.180367] RIP: 0033:0x454e79 [ 100.183533] RSP: 002b:00007f4d804b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 100.191215] RAX: ffffffffffffffda RBX: 00007f4d804b16d4 RCX: 0000000000454e79 [ 100.198459] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 100.205703] RBP: 000000000072bea0 R08: 0000000020000240 R09: 0000000000000000 [ 100.212950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 100.220196] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 2018/03/31 08:42:54 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000400)=@in6={0xa, 0x0, 0x80000001, @local={0xfe, 0x80, [], 0xaa}, 0xff}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000500)="b4230d2b4271643ada5b4d9af2dbd0a6838511792da4a3db9ccd895ca891c9d7f4042694ed3d943971cdd4ca189054608aeb0b7920974a22e8f35b236fca21f8274ac698da8936270f692d86d85383bfe9dbaded49d5326fd97d7fe238a0f1a6ebc120ca26b3ff8701743e042bfbe8704aadde9bb15d2234b8489ed50794f6dc03e4ecc7f5d67ef036cb69f61550a64c7e3966d220f3ed2e796c3b1899ddba0116cb190ce16b88c4a69d7f2816d683ca7a89bf0d7bf39021037b216c581d757f559e72f0d98f6cc0fb2bbc35c56e4cafce74249bf45cc2b4", 0xd8}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x20) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) 2018/03/31 08:42:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10, 0x2000001c, &(0x7f00000001c0)=ANY=[@ANYBLOB="38000000000000000000000000004400000000000000000000000000009500000000000000ac696276e123000000"], &(0x7f0000000180)='syzkaller\x00', 0x405, 0xffffffffffffffa0, &(0x7f0000000300)=""/251, 0x4, 0x2000000000fff}, 0x48) 2018/03/31 08:42:54 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x0, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) r6 = gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r7}, 0x48) perf_event_open(&(0x7f0000000840)={0x6, 0x70, 0x6, 0x4, 0xb9, 0x1, 0x0, 0x46, 0x2, 0xb, 0x4, 0x0, 0x4, 0xffffffff, 0x100, 0x1, 0x7, 0x6, 0x3ff, 0x8, 0x4, 0x5, 0x2, 0x1000, 0x4b, 0x1, 0x7, 0x9, 0x0, 0x0, 0x7, 0xfffffffffffffff7, 0x9, 0x4, 0x0, 0x0, 0xf0, 0x100000001, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800)}, 0x1, 0x8001, 0x7f, 0x1, 0x1, 0x8, 0x2}, r6, 0xf, r5, 0x8) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r8, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r9, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:54 executing program 0: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000a00)=ANY=[@ANYBLOB="01e100000000000000d6000000"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x0, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1, 0x1, 0xfffffffffffffffa, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 08:42:54 executing program 1 (fault-call:4 fault-nth:5): bpf$MAP_CREATE(0x0, &(0x7f0000000680)={0x7, 0x20, 0x400000, 0x7, 0xa}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f00000001c0)='cpuset\x00', 0x0, &(0x7f0000000240)="4d5d4c57b27987") mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f00000e7000)) socketpair(0x4, 0x100007, 0x8001, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000004c0)='ramfs\x00', 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x1}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000014f88)={0x5, 0xfffffffffffffdc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80806, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) close(0xffffffffffffffff) socketpair(0x0, 0x80003, 0xffff, &(0x7f0000000380)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)}, 0x10) [ 100.320757] 9pnet_virtio: no channels available for device ./file0 2018/03/31 08:42:54 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x9, &(0x7f0000000580)=ANY=[@ANYBLOB="2e000000ff7f000000000000f8ffffff55f60200f0ffffff00000000000000000752000007ffbf8f2a2443a86a70caffff0000000000000000bdbf8800080000000000000000000000ec6f149a767e"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r2}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r3}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) gettid() recvmsg(r0, &(0x7f0000017e80)={&(0x7f0000014900)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017d40)=[{&(0x7f0000014980)=""/4096, 0x1000}, {&(0x7f0000015980)=""/202, 0xca}, {&(0x7f0000015a80)=""/4096, 0x1000}, {&(0x7f0000016a80)=""/36, 0x24}, {&(0x7f0000016ac0)=""/175, 0xaf}, {&(0x7f0000016b80)=""/4096, 0x1000}, {&(0x7f0000017b80)=""/177, 0xb1}, {&(0x7f0000017c40)=""/233, 0xe9}], 0x8, &(0x7f0000017dc0)=""/182, 0xb6, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000017ec0)={0xe, 0x7, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x6, 0xff, 0x8000}, @call={0x85, 0x0, 0x0, 0x10}], {0x95}}, &(0x7f0000000900)='syzkaller\x00', 0x8, 0xf5, &(0x7f00000009c0)=""/245, 0x41100, 0x1, [], r5}, 0x48) socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r3, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000180)="4dbb2545409e4efc2bcece6b546d5ef4d60117ec5eef27ec325775e8e51d01004b0b56e5f7a435c65414baf32e7134edc24cd1c27b047ee77a8df876e3a891dfdedf224f12c578e5049c035b70c1bf722503a32946ad703da77b40fcae0d6efe00c7211d5554c8ff96a30c1e02826fd86249f06887c00bcb3aac", &(0x7f0000000280)=""/120}, 0x18) socketpair(0x1f, 0x800, 0x746, &(0x7f0000000940)) sendmsg$kcm(r6, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) bpf$PROG_LOAD(0x5, &(0x7f0000291000)={0x0, 0x2, &(0x7f000084cff0)=@raw=[@alu], &(0x7f000092e000)='GPL\x00', 0x0, 0xf7, &(0x7f00006f8000)=""/247}, 0x13) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r7, &(0x7f0000000300)="f920f9716c5e1756fcd653c4f9ac9e26f4d1785537ed2d831203f2a639d4bf136a0368b01c59bf457f74495b8d3b1f6b21dda87444182ef9e0eb92280a5e0526", &(0x7f0000000700)="19ab42dfcfe0eaabf4526477ba8b617d15e278605d37b8b43bd2a80781c39a70b6ca16107878cc36665db618776c311674287fa7098dd5cf4de08baa352eed633add27656cea562cb7ba06743d9e7b0e980799ba1d14e44bd2953dc37daa710c19b04391ebf79f0bbab275b809a27bb64c970e0683de0eb30126675a73a4d80cd88a261579a5e975012fb62403b9137557d94b58846aab0d11317603cc11fce817f84b04c53ab7e44394f25f81aadee370c99c1ef32408ea663286692df6aa2c58fc4d64825c33d1b0b2e28c46915643c9516a2568651d6ac5f78008fb1f20731f94bd7a11f54f8d7d1bc492712d", 0x2}, 0x20) 2018/03/31 08:42:54 executing program 5: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xf, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @call={0x85}, @generic={0x7f, 0x968, 0x697}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @jmp={0x5, 0x80000001, 0x8, 0x9, 0xf, 0xfffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0xcf, 0x8c, &(0x7f0000000140)=""/140, 0x41f00, 0x1}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x14, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x2, 0x0, 0x9, 0x7, 0x0, 0x10}, @map={0x18, 0xa342e40de9d8422f, 0x1}, @exit={0x95}, @alu={0x7, 0xfffffffffffffffc, 0xa, 0x9, 0xf, 0x0, 0x1}, @exit={0x95}, @alu={0x7, 0xc97f, 0xf, 0x7, 0xa, 0x96}, @generic={0x2, 0x1b63, 0x300a, 0x4}, @exit={0x95}, @alu={0x4, 0x5, 0xe, 0x2, 0x3, 0xfffffff0, 0xfffffffffffffff1}, @generic={0x1ff, 0x200, 0x8, 0x81}], &(0x7f0000000380)='syzkaller\x00', 0x0, 0xc9, &(0x7f00000003c0)=""/201}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000540)={r1, r3}) socket$kcm(0x29, 0x5, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0x6c55, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x5, 0x1d, 0xffffffffffffffff, 0x57}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x60, 0x5, 0x4, 0x11, r4, 0x19}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0xc}, 0x10) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f00000007c0)="587f") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000840)={r2}) mount(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='bdev\x00', 0x2000010, &(0x7f0000000940)="512f456d8b95445247012d0fbfbb3a9e953c7b3f7d1ccfde5395fb21f303af86d0dd42b8492b5c6f6756b984b54f12bdf0cc3ef61c9989b574fd64f8d71ad755236bb715b925b3641ab490c37082e03e6225c50226e24eb3a975c781b09233afaa87ebfe1a21555a4932ab1b63266c4bd9837bb49366561c0384953933c4655d68a3bf7b4c22b3460c89f1a5d611796bc864cfb906204a1edd50fa82e7a148d0ec78f049e16d2f1fa02d1389165695447e0837fb441e3f86ee13") recvmsg(r2, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/171, 0xab}, {&(0x7f0000000b00)=""/34, 0x22}, {&(0x7f0000000b40)=""/161, 0xa1}], 0x3, &(0x7f0000000cc0)=""/107, 0xffffffffffffffeb, 0x3}, 0x40000041) close(r0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80)=r3, 0x4) r5 = socket$kcm(0x29, 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002600)={&(0x7f0000000dc0)=@nfc, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000e40)=""/87, 0x57}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/194, 0xc2}, {&(0x7f0000001200)=""/224, 0xe0}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/170, 0xaa}, {&(0x7f0000002480)=""/39, 0x27}], 0x9, &(0x7f0000002580)=""/95, 0x5f, 0x69}, 0x0) mount(&(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)='adfs\x00', 0x255542c7d125f19c, 0x0) sendmsg$kcm(r5, &(0x7f0000006100)={&(0x7f0000004c40)=@sco={0x1f, {0x0, 0x7, 0x3ff, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004cc0)="ba50d524f5fd85b498ab2d6538f219f613ac43537932b4a095c158b11f07f7092148433432a2a6db5e0c3fa3dedd0d6e3390f08326b24401ba34b4717b256688c36bfe4bd30c5f15dc824be05efb2b005f866feb4c3868239b9b107192e48d172c780d7db435749a68a81c002e3b7ddfe491c6f25a27be8eaa8019b2adee0e2f2468e449f27db29e3a", 0x89}, {&(0x7f0000005ec0)="6c594dbfe00a02dc75f15d738048151f115b8b30284c3c10309e0b23dbca10b161c99e8a82cac965560a6a30376c330c67a66e13eeaea18173bd6d7a91d5920eae5fcdcf0a3ba997a630c4a3d96affb5bdc1cc0e440f7301a9d7dded0b4baf13f7ba7a921df78a191d27f135144ab59670b065e21632700b97b661a4bc3a4b1baabd425dccc7589f62a46cb11f8a02bb8ecdfc7d06ce604a23b4865cac81dd8d3b501567b6c7553071c60b56957c528374abe184db0c788f36c493e9fda8859d56", 0xc1}], 0x2, &(0x7f0000006040), 0x0, 0x40}, 0x4000) recvmsg(0xffffffffffffffff, &(0x7f0000009700)={&(0x7f00000094c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000009600)=[{&(0x7f0000009540)=""/163, 0xa3}], 0x1, &(0x7f0000009640)=""/190, 0xbe, 0x6}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009740)={0xf, 0x6, &(0x7f0000006140)=@raw=[@alu={0x4, 0x401, 0x0, 0x0, 0x5, 0xfffffff8}, @alu={0x68c32edd467c8d1f, 0x0, 0x0, 0x7, 0x8, 0x6, 0x8}, @generic={0x5, 0x7f, 0x9, 0x3}], &(0x7f0000006180)='GPL\x00', 0x3, 0x67, &(0x7f00000061c0)=""/103, 0x41000, 0x0, [], r6}, 0x48) 2018/03/31 08:42:54 executing program 2 (fault-call:3 fault-nth:33): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000003c0)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000280)='./file0/bus\x00', &(0x7f0000000300)='bfs\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='securityfs\x00', 0x0, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0/bus/file0\x00', 0x0, 0x18}, 0x10) [ 100.464362] FAULT_INJECTION: forcing a failure. [ 100.464362] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 100.476204] CPU: 1 PID: 10703 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 100.483471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.492820] Call Trace: [ 100.495410] dump_stack+0x194/0x24d [ 100.499031] ? arch_local_irq_restore+0x53/0x53 [ 100.503685] ? __perf_event_task_sched_in+0x200/0xc20 [ 100.508857] ? perf_trace_lock+0xd6/0x900 [ 100.512991] ? perf_event_sync_stat+0x5b0/0x5b0 [ 100.517645] should_fail+0x8c0/0xa40 [ 100.521339] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 100.526419] ? finish_task_switch+0x1c1/0x7e0 [ 100.530890] ? lock_downgrade+0x980/0x980 [ 100.535027] ? lock_release+0xa40/0xa40 [ 100.538977] ? do_raw_spin_trylock+0x190/0x190 [ 100.543538] ? compat_start_thread+0x80/0x80 [ 100.547922] ? _raw_spin_unlock_irq+0x27/0x70 [ 100.552394] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 100.557389] ? trace_hardirqs_on+0xd/0x10 [ 100.561512] ? _raw_spin_unlock_irq+0x27/0x70 [ 100.565983] ? finish_task_switch+0x1c1/0x7e0 [ 100.570451] ? finish_task_switch+0x182/0x7e0 [ 100.574924] ? copy_overflow+0x20/0x20 [ 100.578791] ? should_fail+0x23b/0xa40 [ 100.582657] __alloc_pages_nodemask+0x327/0xdd0 [ 100.587305] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 100.592300] ? __sched_text_start+0x8/0x8 [ 100.596422] ? find_held_lock+0x35/0x1d0 [ 100.600472] ? check_same_owner+0x320/0x320 [ 100.604775] cache_grow_begin+0x72/0x640 [ 100.608819] kmem_cache_alloc+0x400/0x760 [ 100.612949] getname_flags+0xcb/0x580 [ 100.616730] user_path_at_empty+0x2d/0x50 [ 100.620856] do_mount+0x15f/0x2bb0 [ 100.624376] ? copy_mount_string+0x40/0x40 [ 100.628588] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 100.633578] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 100.638313] ? retint_kernel+0x10/0x10 [ 100.642179] ? copy_mount_options+0x18b/0x2e0 [ 100.646655] ? copy_mount_options+0x196/0x2e0 [ 100.651128] ? copy_mount_options+0x1f7/0x2e0 [ 100.655600] SyS_mount+0xab/0x120 [ 100.659145] ? copy_mnt_ns+0xb30/0xb30 [ 100.663010] do_syscall_64+0x281/0x940 [ 100.666878] ? vmalloc_sync_all+0x30/0x30 [ 100.671000] ? _raw_spin_unlock_irq+0x27/0x70 [ 100.675477] ? finish_task_switch+0x1c1/0x7e0 [ 100.679947] ? syscall_return_slowpath+0x550/0x550 [ 100.684852] ? syscall_return_slowpath+0x2ac/0x550 [ 100.689759] ? prepare_exit_to_usermode+0x350/0x350 [ 100.694751] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 100.700094] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 100.704918] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 100.710081] RIP: 0033:0x454e79 [ 100.713246] RSP: 002b:00007f4d804b0c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 100.720930] RAX: ffffffffffffffda RBX: 00007f4d804b16d4 RCX: 0000000000454e79 [ 100.728177] RDX: 00000000200001c0 RSI: 0000000020000040 RDI: 0000000020000000 [ 100.735423] RBP: 000000000072bea0 R08: 0000000020000240 R09: 0000000000000000 [ 100.742665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 100.749909] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000005 [ 100.793829] FAULT_INJECTION: forcing a failure. [ 100.793829] name failslab, interval 1, probability 0, space 0, times 0 [ 100.805316] CPU: 0 PID: 10719 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 100.812599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.821944] Call Trace: [ 100.824515] dump_stack+0x194/0x24d [ 100.828125] ? arch_local_irq_restore+0x53/0x53 [ 100.832785] should_fail+0x8c0/0xa40 [ 100.836480] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 100.841580] ? find_held_lock+0x35/0x1d0 [ 100.845623] ? __lock_is_held+0xb6/0x140 [ 100.849684] ? check_same_owner+0x320/0x320 [ 100.853988] ? rcu_note_context_switch+0x710/0x710 [ 100.858901] ? find_held_lock+0x35/0x1d0 [ 100.862945] should_failslab+0xec/0x120 [ 100.866899] __kmalloc+0x63/0x760 [ 100.870329] ? lock_downgrade+0x980/0x980 [ 100.874455] ? _raw_spin_unlock+0x22/0x30 [ 100.878582] ? register_shrinker+0x10e/0x2d0 [ 100.882969] ? trace_event_raw_event_module_request+0x320/0x320 [ 100.889009] register_shrinker+0x10e/0x2d0 [ 100.893226] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 100.899004] ? memcpy+0x45/0x50 [ 100.902271] sget_userns+0xbbf/0xe40 [ 100.905965] ? kernfs_sop_show_path+0x190/0x190 [ 100.910616] ? kernfs_sop_show_options+0x180/0x180 [ 100.915527] ? destroy_unused_super.part.6+0xd0/0xd0 [ 100.920621] ? check_same_owner+0x320/0x320 [ 100.924925] ? rcu_pm_notify+0xc0/0xc0 [ 100.928804] ? rcu_read_lock_sched_held+0x108/0x120 [ 100.933799] ? kmem_cache_alloc_trace+0x459/0x740 [ 100.938622] ? lock_downgrade+0x980/0x980 [ 100.942760] kernfs_mount_ns+0x13d/0x8b0 [ 100.946802] ? kernfs_super_ns+0x70/0x70 [ 100.950850] sysfs_mount+0xc2/0x1c0 [ 100.954456] ? sysfs_kill_sb+0x40/0x40 [ 100.958322] ? alloc_pages_current+0xbe/0x1e0 [ 100.962799] ? security_sb_copy_data+0x81/0xb0 [ 100.967360] mount_fs+0x66/0x2d0 [ 100.970710] vfs_kern_mount.part.26+0xc6/0x4a0 [ 100.975272] ? may_umount+0xa0/0xa0 [ 100.978881] ? _raw_read_unlock+0x22/0x30 [ 100.983010] ? __get_fs_type+0x8a/0xc0 [ 100.986884] do_mount+0xea4/0x2bb0 [ 100.990408] ? copy_mount_string+0x40/0x40 [ 100.994619] ? rcu_pm_notify+0xc0/0xc0 [ 100.998491] ? copy_mount_options+0x5f/0x2e0 [ 101.002877] ? rcu_read_lock_sched_held+0x108/0x120 [ 101.007874] ? kmem_cache_alloc_trace+0x459/0x740 [ 101.012696] ? kasan_check_write+0x14/0x20 [ 101.016911] ? _copy_from_user+0x99/0x110 [ 101.021044] ? copy_mount_options+0x1f7/0x2e0 [ 101.025521] SyS_mount+0xab/0x120 [ 101.028951] ? copy_mnt_ns+0xb30/0xb30 [ 101.032821] do_syscall_64+0x281/0x940 [ 101.036687] ? vmalloc_sync_all+0x30/0x30 [ 101.040814] ? _raw_spin_unlock_irq+0x27/0x70 [ 101.045288] ? finish_task_switch+0x1c1/0x7e0 [ 101.049761] ? syscall_return_slowpath+0x550/0x550 [ 101.054672] ? syscall_return_slowpath+0x2ac/0x550 [ 101.059579] ? prepare_exit_to_usermode+0x350/0x350 [ 101.064576] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 101.069922] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 101.074751] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 101.079920] RIP: 0033:0x454e79 [ 101.083086] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 101.090773] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 101.098023] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 101.105270] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 101.112520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 101.119766] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000021 [ 101.159924] 9pnet_virtio: no channels available for device ./file0 [ 101.163631] kasan: CONFIG_KASAN_INLINE enabled [ 101.171241] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 101.178674] general protection fault: 0000 [#1] SMP KASAN [ 101.184201] Dumping ftrace buffer: [ 101.187723] (ftrace buffer empty) [ 101.191410] Modules linked in: [ 101.194586] CPU: 0 PID: 10719 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #43 [ 101.201833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.211170] RIP: 0010:__list_del_entry_valid+0x7e/0x150 [ 101.216508] RSP: 0018:ffff88019a38f658 EFLAGS: 00010246 [ 101.221850] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 101.229095] RDX: 0000000000000000 RSI: ffff8801d7a18518 RDI: ffff8801d7a18520 [ 101.236338] RBP: ffff88019a38f670 R08: ffffffff81d39d22 R09: 0000000000000004 [ 101.243584] R10: ffff88019a38f670 R11: 0000000000000000 R12: 0000000000000000 [ 101.250828] R13: ffff8801cbfb8000 R14: ffff88019a38f700 R15: ffff8801d7a18518 [ 101.258073] FS: 00007f02e5b84700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 101.266273] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 101.272130] CR2: 00007fbd4faf4000 CR3: 00000001c80f1003 CR4: 00000000001606f0 [ 101.279380] DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000 [ 101.286946] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 101.294194] Call Trace: [ 101.296761] ? mutex_lock_nested+0x16/0x20 [ 101.300976] kernfs_kill_sb+0x9e/0x330 [ 101.304843] ? unregister_shrinker+0x22c/0x3a0 [ 101.309401] ? kernfs_mount_ns+0x8b0/0x8b0 [ 101.313612] ? perf_trace_mm_vmscan_writepage+0x790/0x790 [ 101.319126] ? register_shrinker+0x235/0x2d0 [ 101.323513] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 101.329289] sysfs_kill_sb+0x22/0x40 [ 101.332979] deactivate_locked_super+0x88/0xd0 [ 101.337538] sget_userns+0xbda/0xe40 [ 101.341229] ? kernfs_sop_show_path+0x190/0x190 [ 101.345876] ? kernfs_sop_show_options+0x180/0x180 [ 101.350782] ? destroy_unused_super.part.6+0xd0/0xd0 [ 101.355868] ? check_same_owner+0x320/0x320 [ 101.360169] ? rcu_pm_notify+0xc0/0xc0 [ 101.364040] ? rcu_read_lock_sched_held+0x108/0x120 [ 101.369035] ? kmem_cache_alloc_trace+0x459/0x740 [ 101.373858] ? lock_downgrade+0x980/0x980 [ 101.377994] kernfs_mount_ns+0x13d/0x8b0 [ 101.382037] ? kernfs_super_ns+0x70/0x70 [ 101.386079] sysfs_mount+0xc2/0x1c0 [ 101.389682] ? sysfs_kill_sb+0x40/0x40 [ 101.393549] ? alloc_pages_current+0xbe/0x1e0 [ 101.398026] ? security_sb_copy_data+0x81/0xb0 [ 101.402588] mount_fs+0x66/0x2d0 [ 101.405935] vfs_kern_mount.part.26+0xc6/0x4a0 [ 101.410496] ? may_umount+0xa0/0xa0 [ 101.414101] ? _raw_read_unlock+0x22/0x30 [ 101.418228] ? __get_fs_type+0x8a/0xc0 [ 101.422097] do_mount+0xea4/0x2bb0 [ 101.425619] ? copy_mount_string+0x40/0x40 [ 101.429834] ? rcu_pm_notify+0xc0/0xc0 [ 101.433702] ? copy_mount_options+0x5f/0x2e0 [ 101.438088] ? rcu_read_lock_sched_held+0x108/0x120 [ 101.443083] ? kmem_cache_alloc_trace+0x459/0x740 [ 101.447906] ? kasan_check_write+0x14/0x20 [ 101.452117] ? _copy_from_user+0x99/0x110 [ 101.456244] ? copy_mount_options+0x1f7/0x2e0 [ 101.460720] SyS_mount+0xab/0x120 [ 101.464149] ? copy_mnt_ns+0xb30/0xb30 [ 101.468019] do_syscall_64+0x281/0x940 [ 101.471881] ? vmalloc_sync_all+0x30/0x30 [ 101.476006] ? _raw_spin_unlock_irq+0x27/0x70 [ 101.480482] ? finish_task_switch+0x1c1/0x7e0 [ 101.484952] ? syscall_return_slowpath+0x550/0x550 [ 101.489856] ? syscall_return_slowpath+0x2ac/0x550 [ 101.494760] ? prepare_exit_to_usermode+0x350/0x350 [ 101.499754] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 101.505094] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 101.509916] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 101.515080] RIP: 0033:0x454e79 [ 101.518248] RSP: 002b:00007f02e5b83c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 101.525931] RAX: ffffffffffffffda RBX: 00007f02e5b846d4 RCX: 0000000000454e79 [ 101.533179] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000020000180 [ 101.540422] RBP: 000000000072bea0 R08: 00000000200004c0 R09: 0000000000000000 [ 101.547667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 101.554911] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000021 [ 101.562165] Code: 00 00 00 00 ad de 49 39 c4 74 66 48 b8 00 02 00 00 00 00 ad de 48 89 da 48 39 c3 74 65 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 75 7b 48 8b 13 48 39 f2 75 57 49 8d 7c 24 08 48 b8 [ 101.581419] RIP: __list_del_entry_valid+0x7e/0x150 RSP: ffff88019a38f658 [ 101.588384] ---[ end trace ef06f10c882e0b61 ]--- [ 101.593169] Kernel panic - not syncing: Fatal exception [ 101.598951] Dumping ftrace buffer: [ 101.602475] (ftrace buffer empty) [ 101.606159] Kernel Offset: disabled [ 101.609764] Rebooting in 86400 seconds..