000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x1cb, 0x9, 0x8, 0x8, 0x0, 0x8, 0x9000, 0x5, 0x1000, 0x6, 0x8, 0x8, 0x200, 0x8001, 0x100, 0x0, 0x5, 0xac, 0x1f, 0x6f80000000000, 0xffffffff, 0x1ff, 0x8000, 0x4, 0x3, 0xffffffffffffff5a, 0x0, 0x5, 0xffff, 0x994, 0xf5b, 0x7, 0x7, 0x0, 0x9, 0x2, 0x0, 0x1000, 0x1, @perf_config_ext={0x40000000000000, 0x2b2c}, 0x221, 0x40, 0xffffffffffffffc1, 0x4, 0x4, 0x0, 0xffff}, r2, 0x2, r0, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000600)={r4, &(0x7f0000000500)="4b9e494223f884be5bc15787770e89599fa29bd59a510ba5c65151d48ca2d3e5b609ebb321cbb4346ec931fe460ca85b2b92a5e44f171890dd9ccd61ef131f9c7e715b02969e0386f6dccab3e3ff8b132b9494d50f93a313df5376305370044c98263fe5125486547c9484fec53915658e6fc1275cc189b776f08adbad02cb64eca75fe4c468e2605e63a7373e2c43abd17b3b93", &(0x7f00000005c0)=""/20}, 0x18) 2018/04/05 10:22:02 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) r3 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r2) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000912cf914d86c2b43f80e0d9c6e97f5753998bc46a36a55136c04bb1aac3db338c9b602b918cf8d81f6124f7578d80119933ff5257b42875cb1e17a292d2c2497ece793eb79c766d906f8"], &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x18000000]}, 0x2c) 2018/04/05 10:22:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:02 executing program 2: socketpair(0x15, 0x5, 0x8000be01, &(0x7f00000001c0)) 2018/04/05 10:22:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:02 executing program 6: recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000005140)={&(0x7f0000004ec0)=@can={0x0, 0x0}, 0x80, &(0x7f00000050c0)=[{&(0x7f0000004f40)=""/242, 0xf2}, {&(0x7f0000005040)=""/124, 0x7c}], 0x2, &(0x7f0000005100)=""/38, 0x26, 0x3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f00000004c0)='GPL\x00', 0xff, 0xfffffe34, &(0x7f00000002c0)=""/171, 0x41100, 0x1, [], r0}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r2) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0xd000000]}, 0x2c) 2018/04/05 10:22:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:03 executing program 2: socketpair(0x15, 0x5, 0x80000025, &(0x7f00000001c0)) 2018/04/05 10:22:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:03 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="180000001f0000000000000001000080750a18000100000000000000010000009500000000000000"], &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xb5}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r2) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) recvmsg(r2, &(0x7f00000006c0)={&(0x7f0000000500)=@nfc, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000580)=""/66, 0x42}, {&(0x7f0000000880)=""/171, 0xab}, {&(0x7f0000000780)=""/115, 0x73}, {&(0x7f0000000940)=""/142, 0x8e}, {&(0x7f0000000a00)=""/136, 0x88}, {&(0x7f0000000c40)=""/212, 0xd4}], 0x6, &(0x7f0000000600)=""/45, 0x2d, 0x3ff}, 0x2000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000dc0)={r2, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x6}, 0xdf) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000d40)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000d80)) 2018/04/05 10:22:03 executing program 7: socketpair(0x0, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:03 executing program 2: socketpair(0x15, 0x5, 0x800001ab, &(0x7f00000001c0)) 2018/04/05 10:22:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x1800]}, 0x2c) 2018/04/05 10:22:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:03 executing program 7: socketpair(0x0, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:03 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0x9, 0xab, &(0x7f00000004c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18437af5e19a6fe115cc34bb07186c000000000000000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:03 executing program 2: socketpair(0x15, 0x5, 0x80000091, &(0x7f00000001c0)) 2018/04/05 10:22:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x1100000000000000]}, 0x2c) 2018/04/05 10:22:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:04 executing program 3 (fault-call:4 fault-nth:0): socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:04 executing program 2: socketpair(0x15, 0x5, 0x8000005d, &(0x7f00000001c0)) 2018/04/05 10:22:04 executing program 7: socketpair(0x0, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x500000000000000]}, 0x2c) 2018/04/05 10:22:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:04 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000001f0000000000000002000080752a18000508000000000000080000fb0600000000000000d4acbfa367c9"], &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000500)) r3 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r2) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r0, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000008000000000000f72e03da390af7f848b191672cfd6fd2476704d394000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) recvmsg$kcm(r1, &(0x7f0000004500)={&(0x7f0000004040)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000004440)=[{&(0x7f00000040c0)=""/241, 0xf1}, {&(0x7f00000041c0)=""/231, 0xe7}, {&(0x7f00000042c0)=""/129, 0x81}, {&(0x7f0000001fc0)=""/28, 0x1c}, {&(0x7f0000004380)=""/180, 0xb4}, {&(0x7f00000071c0)=""/4096, 0x1000}], 0x6, &(0x7f00000044c0)=""/49, 0x31, 0x200}, 0x1) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000004540)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000004580)={r7, r0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0x10) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000880)={r8, &(0x7f0000000780)="810d313d684e5f4e4d04d4ee1ba8f12ac4cc8cf74692f6879ac6491538852c472ca42ab21134c61f6049e9c9b394475dd8a83541ac902d85c5bcdbbcd0228f9410041c268c09a01cc1d4e48c", &(0x7f00000006c0)="fe8887fcb8166ecdb578b9cb1ec1b168f58c60f5b1c17d08f37e0a9136765032", 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x9, 0x8, 0x3ff, 0x5, 0x10, r5, 0xbc}, 0x2c) 2018/04/05 10:22:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x11000000]}, 0x2c) 2018/04/05 10:22:04 executing program 2: socketpair(0x15, 0x5, 0x8000b401, &(0x7f00000001c0)) 2018/04/05 10:22:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:04 executing program 7: socketpair(0x1, 0x0, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 381.379742] FAULT_INJECTION: forcing a failure. [ 381.379742] name failslab, interval 1, probability 0, space 0, times 0 [ 381.391065] CPU: 0 PID: 28572 Comm: syz-executor3 Not tainted 4.16.0+ #1 [ 381.397900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.407242] Call Trace: [ 381.409846] dump_stack+0x1b9/0x29f [ 381.413487] ? arch_local_irq_restore+0x52/0x52 [ 381.418147] should_fail.cold.4+0xa/0x1a [ 381.422196] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 381.427284] ? lock_downgrade+0x8e0/0x8e0 [ 381.431428] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 381.436973] ? proc_fail_nth_write+0x96/0x1f0 [ 381.441462] ? proc_cwd_link+0x1d0/0x1d0 [ 381.445510] ? find_held_lock+0x36/0x1c0 [ 381.449572] ? check_same_owner+0x320/0x320 [ 381.453887] ? __lock_is_held+0xb5/0x140 [ 381.457934] ? rcu_note_context_switch+0x710/0x710 [ 381.462862] should_failslab+0x124/0x180 [ 381.466919] __kmalloc_track_caller+0x2c4/0x760 [ 381.471576] ? strncpy_from_user+0x500/0x500 [ 381.475970] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 381.482813] ? strndup_user+0x77/0xd0 [ 381.486597] memdup_user+0x2c/0xa0 [ 381.490119] strndup_user+0x77/0xd0 [ 381.493729] ksys_mount+0x3c/0x140 [ 381.497253] SyS_mount+0x35/0x50 [ 381.500600] ? ksys_mount+0x140/0x140 [ 381.504386] do_syscall_64+0x29e/0x9d0 [ 381.508266] ? vmalloc_sync_all+0x30/0x30 [ 381.512401] ? kasan_check_write+0x14/0x20 [ 381.516625] ? syscall_return_slowpath+0x5c0/0x5c0 [ 381.521542] ? syscall_return_slowpath+0x30f/0x5c0 [ 381.526460] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 381.531809] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 381.536640] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 381.541809] RIP: 0033:0x4552d9 [ 381.544979] RSP: 002b:00007f7f5255ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 381.552670] RAX: ffffffffffffffda RBX: 00007f7f5255f6d4 RCX: 00000000004552d9 [ 381.559932] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 381.567184] RBP: 000000000072bf58 R08: 000000002000a000 R09: 0000000000000000 2018/04/05 10:22:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0xe000000]}, 0x2c) 2018/04/05 10:22:05 executing program 2: socketpair(0x15, 0x5, 0x8000ee00, &(0x7f00000001c0)) 2018/04/05 10:22:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:05 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) mount(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='aio\x00', 0x2, &(0x7f0000002040)="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") recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0xffffffff, 0xc98, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={r2, &(0x7f0000000880)="88cafea9b064030583b8729bc6b661cb41372f1bcb505d17a9631ccc93fda5426870e85280c5948776fa3ef4bdfffaa975b7aca491422bd6360946b732149d6c0814eb85f379eaddd6124a7af54190af9028c9bba41d86c7cd3ebe2cfbea09871443f862cd44934ef32b4abbf71078f2b1a7db450eea1e2823950f11b604f013c70a11327930d89f109ecfb57773b0bdd3e95d83fc34b3db82447b461d883fde2687eeee50dcecd03b4c0cf57347d1e122b4132dcd039829f7ab37da6cdecdb7b5b31db909b6d1cdb2889376579c7ded2ba44e31062f322d47f77801c70f41", &(0x7f0000000780)="8e18c4d559de4764890f5ffb5a89393f41998c58f3291d3bbbf811104bc523ceb16669560f909028d55e56c7c00f0e82f0127ed10f2f9b8c1b57ad0ce853a8d9a115f5a14b213c63e293ecafa2b910db257875e0908884132fd9d8a910e7b0bcad7ccb628583e8ee396c17bec5c8bd49980f5a0a13b2d1", 0x2}, 0x20) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x100) 2018/04/05 10:22:05 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:05 executing program 7: socketpair(0x1, 0x0, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 381.574438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 381.581697] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000000 2018/04/05 10:22:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x600000000000000]}, 0x2c) 2018/04/05 10:22:05 executing program 2: socketpair(0x15, 0x5, 0x80000054, &(0x7f00000001c0)) 2018/04/05 10:22:05 executing program 7: socketpair(0x1, 0x0, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0xa00000000000000]}, 0x2c) 2018/04/05 10:22:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:06 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:06 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x20000000070}, 0xfffffffffffffff0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000340)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18060000e0a7defd93d4b0fb1f0000000000000001000080750a18000100000000000000000000009500000000000000"], &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r2) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000004c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x9) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:06 executing program 2: socketpair(0x15, 0x5, 0x80000185, &(0x7f00000001c0)) 2018/04/05 10:22:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:06 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='//file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x400000000000000]}, 0x2c) 2018/04/05 10:22:06 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0xc000000]}, 0x2c) 2018/04/05 10:22:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:06 executing program 2: socketpair(0x15, 0x5, 0x8000018a, &(0x7f00000001c0)) 2018/04/05 10:22:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:06 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:06 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="180000001f005ca32a367ce66a3c0080750a18000100000000000000000000009500000000000000"], &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x0, &(0x7f0000000180)=""/105, 0xfffffffffffffed5}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f00000004c0)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0x7, 0x8}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0xf00]}, 0x2c) 2018/04/05 10:22:07 executing program 2: socketpair(0x15, 0x5, 0x80008e00, &(0x7f00000001c0)) 2018/04/05 10:22:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:07 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x7]}, 0x2c) 2018/04/05 10:22:07 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='.//ile0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:07 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair(0xa, 0x0, 0x3d0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000006c0)={r0, &(0x7f0000000500)="6a6b6d25daa7320db5bd82d48d59f07af541a4e8e42c9ff609d17e2664b3a1ce206756767f610eb79ec0a7fe695d54fbbd689c96ff3e41f3b6d4d0ed49720d0f05bcfc2eef9f7a888fa56d7050bf2794549601abacb365923db78926ed6e6f2ca00e5a366ae1de92250b8f6147305ef50532c58f9ba550874841bfbe0d19368a91070defaf4c65ca5b9c9e084101f51e2ea0", &(0x7f00000005c0)="2dfc2197c02bfd2647f53039866b5a68b8d7dc101dfae9edadbf4d75265e10113140b810e377d4fd0a513f5ec3f61c33c33c6812982c67139b809345f7db9e9a85c31700b2d632c956d5a70d8031e2e074712ea8c2c936447ab60d4af2056b73d15eda1fb128a7", 0x1}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r2) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:07 executing program 2: socketpair(0x15, 0x5, 0x80008401, &(0x7f00000001c0)) 2018/04/05 10:22:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x11]}, 0x2c) 2018/04/05 10:22:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:07 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000580)=ANY=[@ANYBLOB="180000001f00000000000000010000eab5ecbac64e540a379f82bf360fdc8f33bf3813ec6ae641e7da9e8075cdb970a30e5e0a2a00"], &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r2) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0x50, &(0x7f00000004c0)}, 0x10) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:08 executing program 2: socketpair(0x15, 0x5, 0x80005801, &(0x7f00000001c0)) 2018/04/05 10:22:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:08 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x2]}, 0x2c) 2018/04/05 10:22:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:08 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f00000004c0)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f00000005c0)="c9d25bc61fe7fd6f00076113d2977e41dd84f2c41e1b2537d2f6c0fa4e8eae570a2606a4233363fdf25ffc9e2a2a8649ad3cddf0607c668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c6900", &(0x7f0000000780)=""/100, 0xff, 0x5}, 0xfffffffffffffdce) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:08 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./.ile0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:08 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:08 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x3]}, 0x2c) 2018/04/05 10:22:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:08 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0xffffffffffffffd2, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/232}, {&(0x7f0000000880)=""/220}, {&(0x7f0000000980)=""/171}, {&(0x7f0000000a40)=""/252}], 0x0, &(0x7f00000004c0)=""/93, 0x5d}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x7fff) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000780)) 2018/04/05 10:22:08 executing program 2: socketpair(0x15, 0x5, 0x80000092, &(0x7f00000001c0)) 2018/04/05 10:22:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:08 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x800000000000000]}, 0x2c) 2018/04/05 10:22:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:08 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x10000000]}, 0x2c) 2018/04/05 10:22:09 executing program 2: socketpair(0x15, 0x5, 0x800001e2, &(0x7f00000001c0)) 2018/04/05 10:22:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:09 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000004c0)=0xf8) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x1, 0x18}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r3, 0x28, &(0x7f0000000540)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x100000000000000]}, 0x2c) 2018/04/05 10:22:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:09 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file-\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:09 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:09 executing program 2: socketpair(0x15, 0x5, 0x80000028, &(0x7f00000001c0)) 2018/04/05 10:22:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x3000000]}, 0x2c) 2018/04/05 10:22:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0xb000000]}, 0x2c) 2018/04/05 10:22:09 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={0xffffffffffffffff, 0x0, 0x7, 0xfffffffffffffd8f, &(0x7f0000000080)="e7b60ddfbc3563", &(0x7f00000008c0)=""/110, 0x7}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00', 0x0, 0x8}, 0x10) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xf, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="38f2ffffff00000000000000a735563dd728e634172d00001ecb1aa519fd5d020b2362495c2806e52dc6dec6f16bd3d4fb003fb292e8dea8adc6800927141126ce02b66d000ffbe1412cfdde0e17ab06a5491d5c8c11910efbbdf348f7bc3c7af704df11b32d6b62a26c0f98a7adea38a7374842c7a92e4b10c5ff16c46e83d0b82d27dc5738e8ce2bbc54902809e79aa015e1019f6f9f0f7bae6ae9da59cc8f8e3040fb310fdab80a2efd77c5bde22fde44d1bbbc4921c6cffc63eb702f35c976c62c0c3679ab5e23009f379ff3cf5388d85afc2b1a8029891b64dbe7d106f67b2fe7523dad0c7ad4f07abe7d"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000b40)=""/251}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r2, 0x28, &(0x7f00000006c0)}, 0x10) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:10 executing program 2: socketpair(0x15, 0x5, 0x800001bd, &(0x7f00000001c0)) 2018/04/05 10:22:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0xfffffff5) 2018/04/05 10:22:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:10 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x300]}, 0x2c) 2018/04/05 10:22:10 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file#\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:10 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:10 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0x50, &(0x7f00000004c0)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000006c0)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r2) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000580)) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x7ffffffff000) 2018/04/05 10:22:10 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x1100]}, 0x2c) 2018/04/05 10:22:10 executing program 2: socketpair(0x15, 0x5, 0x8000008b, &(0x7f00000001c0)) 2018/04/05 10:22:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x7000000]}, 0x2c) 2018/04/05 10:22:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:11 executing program 2: socketpair(0x15, 0x5, 0x800000b2, &(0x7f00000001c0)) 2018/04/05 10:22:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0xf0ff7f00000000) 2018/04/05 10:22:11 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000000500)=@framed={{0x18}, [], {0x95}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000b40)=""/251}, 0x48) socketpair(0x13, 0x807, 0x16, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={r2, &(0x7f0000000540)="961fbbcd0a354487347df89c1a43eae8c8ea8b052edcc2dc7355bec896e1f784a6b033dfe79582e844c3828a3e38cdcbd4c6cd1fa27d1c1a716f8a84222b625e4cd202a50689994e36e0b1af5339", &(0x7f00000005c0)="53082de9570e344ff1d01d7c7be6533d0b692e816e077ee5bfb583446558d83f2e", 0x3}, 0x20) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:11 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:11 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file+\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x4000000]}, 0x2c) 2018/04/05 10:22:11 executing program 2: socketpair(0x15, 0x5, 0x80000059, &(0x7f00000001c0)) 2018/04/05 10:22:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x1000000000000000) 2018/04/05 10:22:11 executing program 2: socketpair(0x15, 0x5, 0x80004a00, &(0x7f00000001c0)) 2018/04/05 10:22:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xc000000]}, 0x2c) 2018/04/05 10:22:11 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) r3 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r3) close(r2) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r0, 0x0, 0xba, 0x2, &(0x7f00000004c0)="2bc415d4fc3b766742960bd5643f2af7f4691e6f0a1bdd08e862241b95ebced3ec9d3460b46ff8a373bbd67f8623dcbf34434af10037686eef279134c5c4a6af57fdf70b911f11de4773e61fd9e9e63105d70f9074edb1acd09a61ea79e6d899de9cea9e35c69a9d1ec9069728ab4fb1a81060282db78bfd7e3b4470f8f0a0fa549e15344d2e713e7569895e8d66ffdf24bf2ed4fb44a5e6ab4757c8943bb765152504bd95f8dbf70d4424590a2b99032d01cdece27e53717374", &(0x7f0000000580)=""/2, 0x3f, 0x8}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:11 executing program 2: socketpair(0x15, 0x5, 0x8000f101, &(0x7f00000001c0)) 2018/04/05 10:22:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x100000000000000) 2018/04/05 10:22:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xb]}, 0x2c) 2018/04/05 10:22:12 executing program 2: socketpair(0x15, 0x5, 0x80000068, &(0x7f00000001c0)) 2018/04/05 10:22:12 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000001f0000000b51da332d29fbcca544cb0000000001000080750a18000100000000000000000000009500000000da0cb9"], &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) r2 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000006c0)={r3, &(0x7f0000000580)="ef3b0171a4f99e1c14d4ca43b8ad62222096ece22cd3a3cc01a58f48efd2f56bd079e017aeb8095765e3caaa12ce663f4f02ca963cb2cecd99e814826ef2053e46ee4c4e34091b2b4b2d3b78c58101999154fefcf446fe42c9584a06804caff3b9c06d77457fb94405d58a6ec0270b17348499709e77ac5340b8798a2b343896e6f9672a5f9d761d51c42188baecb497f9a7f1a19f8a83cb7cfe60bc32"}, 0x10) 2018/04/05 10:22:12 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:12 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:12 executing program 2: socketpair(0x15, 0x5, 0x800001c1, &(0x7f00000001c0)) 2018/04/05 10:22:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x7ffff000) 2018/04/05 10:22:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x8]}, 0x2c) 2018/04/05 10:22:12 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) r2 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000009b97dcb8d148c0ba0c169301ba38b2000000009500000000000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:13 executing program 2: socketpair(0x15, 0x5, 0x80006601, &(0x7f00000001c0)) 2018/04/05 10:22:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x2c) 2018/04/05 10:22:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x2) 2018/04/05 10:22:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:13 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r0) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x700, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000389000)}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:13 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:13 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x200000000000000) 2018/04/05 10:22:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x2c) 2018/04/05 10:22:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:13 executing program 2: socketpair(0x15, 0x5, 0x80006101, &(0x7f00000001c0)) 2018/04/05 10:22:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x1800]}, 0x2c) 2018/04/05 10:22:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x10000000) 2018/04/05 10:22:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xb00]}, 0x2c) 2018/04/05 10:22:14 executing program 2: socketpair(0x15, 0x5, 0x800001ca, &(0x7f00000001c0)) 2018/04/05 10:22:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:14 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:14 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="180000001f0000030000000001000080750a18000100000000000000000000009500000000000000"], &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000540)) close(r2) sendmsg(r1, &(0x7f0000000600)={&(0x7f0000000580)=@pptp={0x18, 0x2, {0x1, @multicast1=0xe0000001}}, 0x80, &(0x7f0000001080)=[{&(0x7f0000000780)="1a8cb415fe1daa25c149736e3a17b8af185a41a1e94f34bdb9830664c67904b8b341adcd2d3fd6b6dae96c2e2fe9fe3aff2b78a7d3e999900659c22a8d1de0dfd0ca52f91a249ae7aa6cb1d6a1717739f812b389f31d9a3ef4dee48abc37ce04559d207df1e986756aa3490f0d6e2bc4f0307d4a93e3a1bb670b0485b3", 0x7d}, {&(0x7f0000000880)="12cc102ddd2338d9d7e812501087ae05b5976467f7fbcf0953ad1bfcfc7048b68efe6a8216a3e6bf78cdc1b124de7d2cacc52543aa7404adc4a156031845ac3bc69af1d99a4c692ab2d141df7b87d13a0c3091814d30b397b3fa9a97e64bb0329d5cecdf7cd6026edde40ac931c4e1829ebd7f8864ff78ec219fb66b91efbddd1190ee865f7aac4bfdcbff3ae2af", 0x8e}, {&(0x7f0000000940)="0c089e5830145fd9dc14d723a56789e35446f51212eaaa0941d44d84c09c79118276e51a0a0602c4cf68c2f9fb871735cd4387b56dfecfb5e8089b44eb949bf88cffb0533e767eadcc0692acbabb508f102ef9eb7c9180d8a07265b6489af6f10420bdbba77a97597c6cb05970c35f1030a78d", 0x73}, {&(0x7f00000009c0)="39b3dfa9a45d6bf86ac52615999ccef72e440839cecbd6c16b478d92dc2532f80e745a8db9e753fed8be8c0e66ae67439bf5bb8667a4105397fddeaeb64ae0ae78bdcd9f2b38cefd36b37fadd76341472f6ba4dae0c132a19e1096fba826e7c10e948fbd442591ff852bf694c90dacfb913c00c94fb9e67cc734f4d915ce0b788e55273de6720ecb7e814db3bfdf0db31067fb8b43b5310e1fc73a054c", 0x9d}, {&(0x7f0000000a80)="c1c2470dc48042626660bf6616efbdf68a12076708f2d18dccd29dbfe4b7992c196cfd6d42a513b84faf3909ac36513d403041ad008bf1a3a3bd02181319b4c5525b20a36e167900e7d27300a76a6f9bd5cbc63e922478c97dc29eafa445cd8ae8e6504d3366d8de8859c1990f5c1f35ae87d244e5", 0x75}, {&(0x7f0000000c40)="87f9164ba4f6e0eb96e81cc82cb2a580a17733e28185a48fae2515a9b34f6b9e721035a6c3e2ab862b592d216a2529b0b31dc2c3c1cedf33957492197834ab2fbd82f9c5c54bbd0540658009428ded30d2ba4fa3c62e5f0f1de29018e83dd8412101473cb9f5", 0x66}, {&(0x7f0000000cc0)="234fe251b4cd8b01ddc5f9f3e0b9fe59797f7c3c1ac994ea8a5377b947e7a59979591c3b19cdcd2331b9e05ad46a97cedaa6755afa075f1829ad16935dc203ce39cc8c80e44c12bc0352ae55", 0x4c}, {&(0x7f0000000d40)="6340fd2b91581e0cf910a4a70c8c4b9a9bbcb0b7ec7c3f78ffc6d352f3300e20b171e5d9b135fdb8463a1f6870b5c7469d7d82857fd50712e0a93966f6d320258a60d791eaab20b6f560d466a08f8fdd97118d337e3cbb4c8047521c940ed7a4a6332a0c66ca943245523b5dc8c2f3af7f900c40a6ed4a26b422e70c06", 0x7d}, {&(0x7f0000000dc0)="e39f662da6f1869ed7d68321777dd2f3685cbad1cf2771c31c92172828481fda5fe88bfd6eaa88421159c3f13d01dd35a35392082c57eba6a2242c40fac0d44a1fa36690be459dd71c729b5475c2d7a29604df07f23c49db460163e8c107f6671e4be6e1a9c4c116f98fffc5d0ca76557c917e8fe93a05173f2df118afd90c2727cfafcacb098d493405f938ca86a22e514c6fb88c81b896057f08dc22285a400a79a870c01ee808832e31", 0xab}, {&(0x7f0000000e80)="1a2e365aad2633a720befa7dfba8a08028d7cbb6049307948ce7ddfae36d750c03b6b7d8bfb679448e58eec5c9adaf83a0aa3bc62ed551bd752b3d463e23ea0f1eac22f0586c85862d0a38abac45390dd0c86a5d1f1a65d707e47f6e9f7e9fa9aab5cbf1b02a4e14f63eba04b0b50b7b3917e24f88916858a16c56c68319103f73ed15ba4b7f741937d63be791fb3b251f8363da3202b81dd60b3a1240963c75a183b6f6a6cfbfbde0b0c301cd26b9163884a581ca9a539a0cb57e8776bee5e186cc4224238b4c61b2064f042961b9157390a4b58caf611f022342f0814ff25fec92012673f3feac1cbd5bd535e2be31bd665c", 0xf3}], 0xa, &(0x7f0000001140)=[{0x70, 0x10e, 0xfffffffffffffffb, "53dc7042e5a3f2018dfc38b6d5a660eab44dee99ce2888cda8011bc659962555b6138699cf853d6094147133f0b6e7bf246140341b18bde20b9cad64e8d56d55bb10eb44d683de8c3e39b4a33c0d1276de402dcdd3623e4537bc2a"}, {0xf0, 0x112, 0x4, "a29fe5ad0ef65f17d8e5967dcbda555188bc39bf17f5b064841bab0ac8f4796115c5e6955cb9d70dd536a44e4a92bcee758bdae3cc08803acc5803e71332e26a3e425e0b2032ef3428a3439c4d66565cd475b0447e879984ef9d36e92bec023b9c697b0bcfd2109e9fe72e00612c2ab020faf6eaf418a8c81b9fbbf2a933f84894dbb90ba8c5671cc14ab33437b2a58c03b1444af4dacd718957810960fd610cb2b82a7ea5e3838dd8cb634a438e8dcc849cc54f133145d56c30b52ba36a2a4db87208ae195af34aaed42fc33bad697e4f0969215ea538eaeeb146"}], 0x160, 0x4800}, 0x40000) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000500)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) recvmsg(r3, &(0x7f0000001640)={&(0x7f00000012c0)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000001340)=""/76, 0x4c}, {&(0x7f00000013c0)=""/163, 0xa3}, {&(0x7f0000001480)=""/12, 0xc}, {&(0x7f00000014c0)=""/204, 0xcc}, {&(0x7f0000002040)=""/4096, 0x1000}], 0x5, &(0x7f0000003040)=""/4096, 0x1000, 0x3}, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000f80)={&(0x7f0000000b00)='./file0\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x402, &(0x7f0000000700)="c9d25bc61fe70170af25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0xfffffffffffffece) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x80000000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f1c12296c4c19bf6563f7fb76a9a760077ff1dbcfeb1fd3f4812b556d0093b9fdf46612bb0bf1c"], &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x0) socketpair$ax25(0x3, 0x2, 0x7, &(0x7f0000001680)) 2018/04/05 10:22:14 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xc]}, 0x2c) 2018/04/05 10:22:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x2000000) 2018/04/05 10:22:14 executing program 2: socketpair(0x15, 0x5, 0x80001301, &(0x7f00000001c0)) 2018/04/05 10:22:14 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180040000000000000000036ea2d59744bc1922a00000600"], &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x2c) 2018/04/05 10:22:15 executing program 2: socketpair(0x15, 0x5, 0x8000f301, &(0x7f00000001c0)) 2018/04/05 10:22:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0xf0ffffff7f0000) 2018/04/05 10:22:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:15 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) r2 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r2, 0x0, 0x59, 0x3e, &(0x7f00000004c0)="4273b951308d68b21818e64ecc9e175ba68f81a445d059f7d9aed8742bf009db423d0ec0c1c561205c7dfc26277c34da1ba8206fac23bd3c4678051301465da3ee4b056dee573699b080819ce3dd17de325996537ea745b003", &(0x7f0000000540)=""/62, 0xd48}, 0x28) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:15 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:15 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x2c) 2018/04/05 10:22:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0xf5ffffff00000000) 2018/04/05 10:22:15 executing program 2: socketpair(0x15, 0x5, 0x80000123, &(0x7f00000001c0)) 2018/04/05 10:22:16 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000e29400000000000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x1000000) 2018/04/05 10:22:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:16 executing program 2: socketpair(0x15, 0x5, 0x80008501, &(0x7f00000001c0)) 2018/04/05 10:22:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xa000000]}, 0x2c) 2018/04/05 10:22:16 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) socketpair(0x10, 0x80001, 0x31, &(0x7f0000000400)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x4f, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000540)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:16 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:16 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0xf5ffffff) 2018/04/05 10:22:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xe000000]}, 0x2c) 2018/04/05 10:22:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:17 executing program 2: socketpair(0x15, 0x5, 0x800001b5, &(0x7f00000001c0)) 2018/04/05 10:22:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:17 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r0) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:17 executing program 2: socketpair(0x15, 0x5, 0x80000007, &(0x7f00000001c0)) 2018/04/05 10:22:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x10) 2018/04/05 10:22:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x700]}, 0x2c) 2018/04/05 10:22:17 executing program 2: socketpair(0x15, 0x5, 0x8000011b, &(0x7f00000001c0)) 2018/04/05 10:22:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:17 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x4]}, 0x2c) 2018/04/05 10:22:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x8000000000000000) 2018/04/05 10:22:17 executing program 2: socketpair(0x15, 0x5, 0x80008c00, &(0x7f00000001c0)) 2018/04/05 10:22:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:18 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x100000000000000) 2018/04/05 10:22:19 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000004c0)) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x5]}, 0x2c) 2018/04/05 10:22:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:19 executing program 2: socketpair(0x15, 0x5, 0x80000157, &(0x7f00000001c0)) 2018/04/05 10:22:19 executing program 7 (fault-call:4 fault-nth:0): socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0xf0ff7f) 2018/04/05 10:22:19 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0L', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x2c) 2018/04/05 10:22:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) close(r0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) getpid() bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r1, 0xfffffffffffffff8, 0x18}, 0xc) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x375, &(0x7f0000000800), 0x0, &(0x7f0000000140)=""/93, 0x5d, 0x5}, 0x0) recvmsg(r0, &(0x7f0000000600)={&(0x7f00000001c0)=@generic, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000640)=""/27, 0x1b}, {&(0x7f0000000240)=""/13, 0xd}, {&(0x7f0000000280)=""/227, 0xe3}, {&(0x7f0000000380)=""/38, 0x26}, {&(0x7f00000003c0)=""/211, 0xd3}], 0x5, &(0x7f0000000540)=""/133, 0x85, 0x80}, 0x1) 2018/04/05 10:22:19 executing program 2: socketpair(0x15, 0x5, 0x80000144, &(0x7f00000001c0)) [ 396.438396] FAULT_INJECTION: forcing a failure. [ 396.438396] name failslab, interval 1, probability 0, space 0, times 0 [ 396.449762] CPU: 0 PID: 29317 Comm: syz-executor7 Not tainted 4.16.0+ #1 [ 396.456600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.465936] Call Trace: [ 396.468514] dump_stack+0x1b9/0x29f [ 396.472143] ? arch_local_irq_restore+0x52/0x52 [ 396.476813] should_fail.cold.4+0xa/0x1a [ 396.480888] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 396.485994] ? lock_downgrade+0x8e0/0x8e0 [ 396.490160] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 396.495686] ? proc_fail_nth_write+0x96/0x1f0 [ 396.500166] ? proc_cwd_link+0x1d0/0x1d0 [ 396.504232] ? find_held_lock+0x36/0x1c0 [ 396.508298] ? check_same_owner+0x320/0x320 [ 396.512599] ? __lock_is_held+0xb5/0x140 [ 396.516646] ? rcu_note_context_switch+0x710/0x710 [ 396.521562] should_failslab+0x124/0x180 [ 396.525616] __kmalloc_track_caller+0x2c4/0x760 [ 396.530274] ? strncpy_from_user+0x500/0x500 [ 396.534667] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 396.540189] ? strndup_user+0x77/0xd0 [ 396.543974] memdup_user+0x2c/0xa0 [ 396.547503] strndup_user+0x77/0xd0 [ 396.551126] ksys_mount+0x3c/0x140 [ 396.554655] SyS_mount+0x35/0x50 [ 396.558006] ? ksys_mount+0x140/0x140 [ 396.561803] do_syscall_64+0x29e/0x9d0 [ 396.565673] ? vmalloc_sync_all+0x30/0x30 [ 396.569809] ? _raw_spin_unlock_irq+0x27/0x70 [ 396.574290] ? finish_task_switch+0x1ca/0x820 [ 396.578768] ? syscall_return_slowpath+0x5c0/0x5c0 [ 396.583685] ? syscall_return_slowpath+0x30f/0x5c0 [ 396.588616] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 396.593979] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 396.598817] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 396.603989] RIP: 0033:0x4552d9 [ 396.607161] RSP: 002b:00007f547881dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 396.614852] RAX: ffffffffffffffda RBX: 00007f547881e6d4 RCX: 00000000004552d9 [ 396.622102] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 396.629354] RBP: 000000000072bf58 R08: 000000002000a000 R09: 0000000000000000 [ 396.636605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 396.643853] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000000 2018/04/05 10:22:20 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000067aba796df60532da5aed20a000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x500]}, 0x2c) 2018/04/05 10:22:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:20 executing program 0: socketpair$unix(0x1, 0x8000000000008, 0x0, &(0x7f0000000100)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) gettid() 2018/04/05 10:22:20 executing program 2: socketpair(0x15, 0x5, 0x800000a0, &(0x7f00000001c0)) 2018/04/05 10:22:20 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:20 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xd]}, 0x2c) 2018/04/05 10:22:20 executing program 0: socketpair$unix(0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f00000000c0)=@can, 0x10, &(0x7f0000000340)=[{&(0x7f0000000140)=""/220}, {&(0x7f0000000380)=""/177}, {&(0x7f0000000000)=""/44}], 0x4f3, &(0x7f0000000040)=""/93, 0xffffffffffffff59}, 0x0) 2018/04/05 10:22:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:21 executing program 2: socketpair(0x15, 0x5, 0x8000011d, &(0x7f00000001c0)) 2018/04/05 10:22:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x5}, [@call={0x85, 0x0, 0x0, 0x2f}], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0x80000001, 0xc1, &(0x7f0000000100)=""/193, 0x41f00, 0x1}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x52, 0x6c, &(0x7f0000000300)="e0ebbeb6adb42593271a33c5bda3b75456f458c95554105a19c73313f651ea491904a13c0432ceb6651814ddd512a165e64bb10344f50ae85a16f2e7f43178445e5d911d7cdd8e3f188c0c8dbf8e408fe8dc", &(0x7f0000000380)=""/108, 0x1, 0x6}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r2) close(r1) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xf]}, 0x2c) 2018/04/05 10:22:21 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000200000005005fb88f9507000000000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:21 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:21 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='//file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x2c) 2018/04/05 10:22:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:21 executing program 2: socketpair(0x15, 0x5, 0x800000d7, &(0x7f00000001c0)) 2018/04/05 10:22:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair$ax25(0x3, 0x5, 0xcd, &(0x7f00000000c0)) socketpair(0x0, 0xa, 0x2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) close(r1) recvmsg(r0, &(0x7f0000000000)={&(0x7f0000004ac0)=@can, 0x80, &(0x7f0000000800), 0x0, &(0x7f0000000040)=""/93, 0x5d}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)) 2018/04/05 10:22:21 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000500)="3447f304003563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r2) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$ax25(0x3, 0x0, 0xc3, &(0x7f00000004c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xf7, 0xe5, &(0x7f0000000880)="e9d1926975cfec00dbaf5bedb8acff9a0a84dc245a6499aa423965ad73d379d7bb01da8ca1549a9cabda8664bd32e5699c579b07a287184f26887c920f01e49b09993d320fd4a16f8b67c2e3cd4ba02b11eef52f2bc7834e6115b833903cb783bd6dcb5a6b8877565fa40dfbc32591ba2e65958f5e939d5b0b99349c0fb5a59de099fa7ee8efe43a748b6b8b4f25d37943c334bfbb87a34862c8a2c3fff0953c77b4c2361656eb0594b3f6090267ae55376744c1586fc5ba2a07387ad883becfced3613e0e43dbf6208eece3b60589c9d2e0c2a23d682e29d8f6567fd378272d25cddf39e6a0b65510aa3dcf05032ed8b072802a3bc483", &(0x7f0000000980)=""/229, 0x6, 0x80000001}, 0x28) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000580)) 2018/04/05 10:22:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xc00]}, 0x2c) 2018/04/05 10:22:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:22 executing program 2: socketpair(0x15, 0x5, 0x8000d401, &(0x7f00000001c0)) 2018/04/05 10:22:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000000)) 2018/04/05 10:22:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x2c) 2018/04/05 10:22:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:22 executing program 6: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x7ff, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000004c0)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair(0x3, 0x80000, 0x3, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000ec0)={r3, r1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r5) recvmsg(r4, &(0x7f0000000980)={&(0x7f0000000580)=@sco, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000880)=""/246, 0xf6}, {&(0x7f0000000600)=""/4, 0x4}, {&(0x7f0000002040)=""/4096, 0x1000}], 0x3, &(0x7f0000000780)=""/127, 0x7f, 0x8}, 0x40) recvmsg(r4, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:22 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c65301e", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:22 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='.//ile0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:22 executing program 2: socketpair(0x15, 0x5, 0x80000036, &(0x7f00000001c0)) 2018/04/05 10:22:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x3000000]}, 0x2c) 2018/04/05 10:22:23 executing program 2: socketpair(0x15, 0x5, 0x80000182, &(0x7f00000001c0)) 2018/04/05 10:22:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x400000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xf000000]}, 0x2c) 2018/04/05 10:22:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:23 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x40100, 0x4000000000001}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:23 executing program 0: socketpair$unix(0x1, 0x400007, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:23 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./.ile0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:23 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:23 executing program 2: socketpair(0x15, 0x5, 0x8000c900, &(0x7f00000001c0)) 2018/04/05 10:22:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair$ax25(0x3, 0x7, 0xcc, &(0x7f0000000000)) 2018/04/05 10:22:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x11000000]}, 0x2c) 2018/04/05 10:22:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:23 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) sendmsg(r0, &(0x7f0000000600)={&(0x7f00000004c0)=@nl=@kern={0x10, 0x0, 0x0, 0x200000}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000540)="7606f09b15f29e4ce2d666f4ce3298ce05296ca1d9bf973e2c40b19b3704e8eaded7fa01c1850001fb3b255dc725f81ca7b1c46eaffbc936ecb132fc8941ce308fbf2089cd", 0x45}, {&(0x7f0000000880)="079358358fb0373500eebe3b953204102bd5dff6b7a7e60fc64055cd5bf26c61a92507eb352f537e8a3e71e22fea50ee1c689b8d5f8382c838f7b229225fe548f7166c39a9e4ca8281bbdb9f22a354556159ee8119534e1ee4ec5b695d732312d45df6310ddbb703ec1fc7b23f650b9a554021a7bc30ce4a185faf2139ad05650eca702c4872768ef3b044698373480af899bba8dce74eb3a758d0405d1eb1d23ccc105df499b4d92b4a17f99dc8bfe497f8ce41f2eb3d0332e5d1c6d7c661c08893163974c1773386d631355631a45031e93ee200296b414e74a20a069c57a8862267b5", 0xe4}, {&(0x7f00000005c0)="c2530ebe581bbe", 0x7}, {&(0x7f0000000780)="4187a4439dee008b24e8b2e4287931e6112021f145e6f2924335dee5f787ce8e2f53cc4e833dc72b0fb8bebd8d0ef770125307cb0084a38b9d15500927ae1d94aac9d84edfe28baf27f7b16b96af0e23368fd2bdab379d5387cb66cf639ba289210c7b985178b543ff8d6098f4d020bf58f173c9b6f1e2cf1b25387eac4a09b4", 0x80}, {&(0x7f0000000980)="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", 0xfc}], 0x5, &(0x7f0000001080)=[{0xa8, 0x0, 0x5, "5b7a06d99fb66a5e8a03bb6f2f3c7dfff0ee3c13ae2e0fdc95b66fb68247da7694e0c21ea4fecaf8ae869d544f4694c59c95b41088f3e1f12b37e5a975fbb5a164729041241e0cf880bec4376cde43c6f3cd874506eb770fa87da338c9311449818ab958524501905c06354975c2d475f354bb867dc0c99bbf785b198fec57763745c595a23a9c414e5ab6a4d73c2213b657ef0af5"}, {0xf8, 0x0, 0x0, "642aa044b9f2a5908eb995e73367673989d9afec7226b2b1ca9dc4500c336bbdb0ae6eb7ec31fabe7716d1a64af56efadc9a34d50809406875a53be8a3ecad322c6d7eb3d1ef0b2cbcf87b1485ebadc8bda162fb820f27bfa2da5c02e7eeef2ebfa302aad9aa2698e784f2f9d0ed25e97607e665a1b4f734613336d9e29efbdf6374b15c84ec22d1649eaf5262a653d6cea5dd64445ec02d1fd67347d816099245212634898430484cd264f4eed78b4516dbdae31fda4ad88408c8babeac36e191c120d7916566c61792f1fe7c684a07ce42e17ecfd2da54dd1cf40770b15bbaa38e8ae1"}, {0xb0, 0x0, 0x9, "08b14d656e9d1bf6c18fc65d64d478ebdee4b11028e8bcf7cfe6aed2b8996a290c3f91073fc3bee8f98e262223c296ea7fade97c992bb2f6e9e554d7875101f8aad73b9d2633a63b75fbff40c16f81e4d13e57671c90a001b381455e370dbd5f4a4da4ec9f5f999200bd3d2e8df26eba474100a078de317d8f89939ab4058f453a5d4f29d4852d093f79b5462618ab600876b15ff2f531708ae8"}, {0x90, 0x118, 0x5, "ab321d2736cb97fa2c87deb50d9720bf59e53064bd75d047bed43b246edbc5f4d6326dc163b05960337aa3ce764cb07edb7155e0bdbe90b4360f0b842aeee9b3e082af5deb3f9375a3ad4960b4ffb0247e6323a39c73d0a54c8ca3925cbff7ef803f233ff1c14ef4febc4ae5f8100367efc9e12d5d1adf9cbfdd2398af57bd28"}, {0x50, 0x1ff, 0x7ff, "53da88c97d163b3f90b67f29f7e05f42825f6feee73873a9aeef97ffad1b88972eb1d56bf93cdeaf97418f1c2626bc0d616b1d737faaf61edde24cc7b7"}, {0xa8, 0x1, 0x8000, "4bf6c37526d62280cbd94f6450572f4053315f0412c3b0f80efe988c715e04fef0cb18cc63a1cf02524c93c7fd3ab1f25ebb06efdc2032bcd2ed2ae5ee1742f854f3a79c64a0ba5fdd60bbe1b374e53572221bd723135e0a8597d8dd466c894840e5267474bc9b352686c1d7f795b4f2f1e86de8ed2226cd4c2891de344a0d11f7145300ab0708d57eca5bc867015da1f0"}], 0x3d8, 0x20000040}, 0x4000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r2) socketpair(0xa, 0x0, 0x3, &(0x7f0000000d80)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000ec0)={r3, &(0x7f0000000dc0)="b00cc3d02f9918d198f6c6c667de677f39102eb155127870ba60a30c1f96dcaa4f3ce359a02b9a25342a42e990407ff80bd5e0a9b933c5c57e7c4e7d9a6864ea1faeb75ec233e5217fc2dc6809f0636bcbb85ae301c52dbebc0e610852ab143398b139bfe8056c6c53ec3acee3eb73afd92f7c", &(0x7f0000000e40)=""/84}, 0x18) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000d40)) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000006c0)={0x0, 0x4, 0x10}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000b00)={r4, &(0x7f0000000c40)="384fe998db87d468c4d2f0af79b1a5edfa0c96bc07994ff08f1dacaa8799a83b1ae610ea5127414b803bc1efe799b5ccd6fc9d4ef162bacca40cfc150707040a6d1d8953da6b4f91a5f0957bb7f0c3725235f2914bcc121a5eb36fb9595fa6830cfd6505015a393c8418da8261fdbc9aec9534313ec7e759043eb23a9ab134df266a6edc34c9b0bcf65195c9c44f266ed7a9724dc378eed57f26e2e51657ace2ba00553fed5e43fd78d02627ab1c5d70ad335a1d05e786e53f8f66fdd2d47c324d95197bf247817ecabdf821a16e77c9a6797f45b915ffe2083d7ef3080d4327c72f64fbc0"}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r0) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) 2018/04/05 10:22:23 executing program 2: socketpair(0x15, 0x5, 0x8000ee01, &(0x7f00000001c0)) 2018/04/05 10:22:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x6000000]}, 0x2c) 2018/04/05 10:22:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xfffffff6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:24 executing program 2: socketpair(0x15, 0x5, 0x80000162, &(0x7f00000001c0)) 2018/04/05 10:22:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xf00]}, 0x2c) 2018/04/05 10:22:24 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xffffffff, 0x9, 0x400, 0x243f, 0x0, 0x0, 0x8, 0x1, 0xa0e6, 0x0, 0x62, 0x4, 0x8, 0xd01942a, 0x100000000, 0x1, 0x0, 0x7, 0xfed, 0xfffffffffffff801, 0x2, 0x7, 0xffffffffffffcb13, 0x1, 0x7, 0x6dc, 0x7, 0x80000000, 0x4, 0x20, 0x5, 0x2, 0x20, 0xfffffffffffffff7, 0x8, 0x81, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x7}, 0x14, 0x6, 0x4, 0x3, 0x2, 0x310c, 0x6}, 0x0, 0xe, 0xffffffffffffffff, 0x2) socketpair(0x3, 0x80005, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:24 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:24 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file#\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:24 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000780)=@generic={0x1, "944fba8f458d8450aa2f2b396ecd557fabcbe68e63eb84d60ba8326173a47f859929e1782df874dd86c4e8fdc1a1339c94a36533d058f736fbe51b57a9c7a20528eb45af346b1245c67b9bdbf8a061f3f2004cc6d462a75d686489dfeec3ba9488f1638f401eb18a44975c9e2fe99e7cc1aab0cd40d4d75ff2bb7fe51736"}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000880)="d438216100ae10129d7ecce44aacdc3d409ae2ee64f32b07e2a9439364fed3768e727e83f570fe0dec8301f49d97111d7efd0697442ddce013e47c5e48dd0e5ce9c5555e52986f57bfba325975d9cf1657bd7b2e854e1eac639773e5495c5066ec5b03e6474aa3ec5ad6d665cbdb5fcae5624dab7165bf3054554d4369618913378122796a0d33902f44b7b270852a14995115c882119c2b2d9028f609b9ebb4dd0aad76bdefc3894642e49553cbe9f4755daa29e9efc5734f8837233078dc0ee167dd21a6d71e19e1fb72038c82a25a67d8a3f231e4e26cee26b73869", 0xdd}, {&(0x7f0000000980)="4d0f05334cbaa137c366365e5b21104fae03e3ab11bee96f836638ca15f89017fb0663c5cd23dc14dee5c38d283ffeb638d895befe34a50dd4ca82c02353a4d44bbca872400be731407215d1c801672f5f0e38dc3d1c529a72bdf846d22336afe2b675c3ccfe22955c1a23122eb45b567e164968627ee87519a7fb9e8cfaa174f44b810065bfc6ce16b739771c9e7d2116e468aa80", 0x95}, {&(0x7f0000000a40)="af8e0c098d3527ffc1804aa73eb6b561c92afb0caf30452f8e47cf46e32bcb15226628e17e769b76f29667868be3ac6d854c045d0dae4ad25656540985530cad349158a70351d7945c71d6d23d6af884c864d0d0804778511e126447b78da1c74e0971ede8eb303b16f215f61e3176828e12972895848ee8fa60339e691fd191ace0f6c7a902dba6a978907c11a3869c70336b64fa6c489424bb613a341ec559d8f9f93d6d54cb4426a17e87ca2911", 0xaf}, {&(0x7f0000000c40)="8970a57b61854696d498827dd4e8684f96ca5203958296f021c29e79fbefa69732ce5c2730709ff75a9383b698a45e1450dbff3b49b588382ab738ab69108efb129773e0e838d6deb58f2d6f6559eaceb1bffbcddc1b71f3af8963ec9ff080bd9b110efd2acc391c407d513f", 0x6c}, {&(0x7f0000000cc0)="9142dc0f786bf80e538c780d24a435c33b6de1215a3bf3506a8c4954e3b51132ca1ae9e37842560a9a3843b157f0cd9eb09a8f682f0ccf2d365f42d3247eaed0b7b41db91e14eaa80164569387c1219ad4577e4d28a058715a4fb0432abfa04313adbba2c01e9e3e799dd86be114260f941af222da5cfdcdc59b1fd63ba5fa934c10bfbca3882ae525a206223f5cdaf5e373b9f56b41f9d76e9e8e7a227afc0df3e65ab027dde5b01b94a5dacccf38761f2cb5cc28ad25a5d245f4046eb038e55e29fd6a997120c1889bfebd5950d975b83cfa1469287a476bc110c07537df0f1d62c5", 0xe3}, {&(0x7f0000000dc0)="97338d0c229b5d016e7a4d8a2b41c691c3cf434bd102e866a108f28bf27b9457e020617c1bd2b5411d3ea578ed5d0022a61f5364d2a3c17686221e385515ddbfe63595c45fd8ca554874d700e0d1235b95e1d32bb11dac5b", 0x58}, {&(0x7f0000000e40)="7c4d3ea798f56434ceeeb7a9e911da331099e2b02a694f59193749339d77b28c37bc3b7f5fcb9f3bce63f1b737ce0e6b0ec960b218af6f687095cff2e2f13520d443267399262b33912a3671f113a59e7e5cb0e0903cea007c0337074ed9ccfda144ece4a6dd577234ee60b4849853f07e", 0x71}], 0x7, &(0x7f0000001080)=[{0xd8, 0x0, 0x1, "4443eca0c923ff227c762b89cc4f4bd570161236d4559295626505bab4e643fc38f27715334db2353781bdf3be6e0c40988a9f49597ba7d36a11ba1d7a23e1bb1ddbd656e39d20f593ca264665346c94a0616190af89bdc1d7bb8850bf58d6af566bdac29cbac8c95d3b6b5ba88b8f89dc6ce096b0194aed89bea71f0b7479ee053abaa15ea6b1a0ccf037b053c6db3a8098fbc9f23ae94fb59520316dea2e35fa2994bdc55276f22895615dada6af575841ac75c8a59e5cda9abfefa65bad469aecdf413528b243"}, {0xd0, 0x0, 0x200, "d3d16fd38ea3a6f5596af16c0a956fc27556337969ffa4269302e05acb8e0ffb67d2f8c23a0c4636c9cc839ea3de443997042c57a83ea1e4ebe56b83e7a9586afb34e41622fcd973f94e676e22101610a582e4154e38ea8feadf57ec663b94cc6df9a606a8a1787b94615dfc86621386ac3d40d657fb48f66b380fc9bc88ec134d760f53ed1e41efcc19ab287102509a47eed886285a48db49d85a579408a6444f7bd8b4dc3285b5b3c76a9c4ffe134cefb413dfe04621f2342b2e0fd7f0"}], 0x1a8, 0x800}, 0x8880) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0x50, &(0x7f00000004c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)=r4, 0x4) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000095b2af7614cfb4b5c27f4982df0000000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x200000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x2c) 2018/04/05 10:22:24 executing program 2: socketpair(0x15, 0x5, 0x8000a901, &(0x7f00000001c0)) 2018/04/05 10:22:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair(0x9, 0x5, 0x7, &(0x7f0000002440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x81) close(r1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002400)={r1, &(0x7f0000001380)="5ff3c5c97be0b2375189358266e37d55171fce1d0fe1e0344a8e62c092bdafc0899387ce0b3ecb56d2fbae93fb45b9bbcd4cf362ed4779356c0a65e2e87407287b48fa2933d505a1cf1539365923781f17fdbccea3af2c9ac2c49c4f1c13a58f704a39f2d10543e0a2a14587f4e502512fff7e99ba", &(0x7f0000001400)=""/4096}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000002500)={&(0x7f0000002480)='./file0\x00'}, 0x10) recvmsg(r0, &(0x7f0000001300)={&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000001280)=[{&(0x7f0000000140)=""/238, 0xee}, {&(0x7f0000000280)=""/4096, 0x1000}], 0x2, &(0x7f00000012c0)=""/47, 0x2f, 0x81}, 0x0) socketpair(0x11bb236ebda2b8c8, 0x0, 0xffffffff, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000024c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000025c0)={r2, 0x50, &(0x7f0000002540)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002600)=r5, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001340)={r4, 0x28, &(0x7f0000000080)}, 0x10) socketpair$ax25(0x3, 0x7, 0xf0, &(0x7f0000000000)) 2018/04/05 10:22:24 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, 0x0, 0x7fff, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x4982, 0x0, 0x0, 0x0, 0xacf, 0xfffffffffffffffc, @perf_config_ext={0x1e1}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000600)=r3, 0x4) close(r2) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x2000000]}, 0x2c) 2018/04/05 10:22:25 executing program 2: socketpair(0x15, 0x5, 0x80000174, &(0x7f00000001c0)) 2018/04/05 10:22:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x2c) 2018/04/05 10:22:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:25 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='sockfs\x00', 0x2000000, &(0x7f0000000580)="811eb503054842be599da7b4c416b4d70d") bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:25 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:25 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file+\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:25 executing program 2: socketpair(0x15, 0x5, 0x800000ed, &(0x7f00000001c0)) 2018/04/05 10:22:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x1100]}, 0x2c) 2018/04/05 10:22:25 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='.\x00', 0x0, 0x8}, 0x10) socketpair$unix(0x1, 0x2005, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) socketpair$ax25(0x3, 0x2, 0xf0, &(0x7f0000000180)) recvmsg$kcm(r2, &(0x7f0000000380)={&(0x7f00000001c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)=""/192, 0xc0}], 0x1, &(0x7f0000000340)=""/51, 0x33, 0x7cba}, 0x2002) sendmsg(r0, &(0x7f0000003ac0)={&(0x7f0000001740)=@llc={0x1a, 0x30a, 0x81, 0x30000000, 0xffffffffffffffe0, 0x7, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000001800)=[{&(0x7f00000017c0)}], 0x1, &(0x7f0000001840)=[{0x40, 0x10b, 0x7f, "a97387e0b3112c35d1aa9ca3cd9c7a28c1b7dd5a1d62f491d9db280c1d3c20d2777b9cf802ba45f5cf61"}, {0x1010, 0x1, 0x1, "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"}, {0x78, 0x108, 0x5, "0f2b9be3bc7d74337a2d7e5f26e01e181c29a75e5f9c9c831ab75e6fef998cd7d96bb6ff753c1401f5bf5d46cacf7269088ef02dd7a1039f0c45e0fd7cd93f9d1d677a8126f1e6d4292f3eafc119475f6e56d40e1e07a60506b5f46c4221830a9d260e985a64"}, {0x1010, 0x13f, 0x1de, "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"}, {0xd0, 0x0, 0x9, "7de58f682ac5f90fd53647edff13478843ee672b36385dbc333bc82403abf64e3c6d1a406bd9967656c24ba3df9a0cd094412593f832d131a15a02aa2958f74a62f0586543b886e9bc466c453982f117b1c9a26a1b48314bc01ef653ff46c340eb519b6fe2a2c0fa2f630ef0e221481ab7774bdc07341f7b998dbe157cdae410f3c769b3a7a8e4f46b216ca5365377fad7c1d219416186217a472c05ca30ffa2a50a6aae1444ed450cfcaf11cf5aeeab54aff5cc144d0c3dc57d59"}, {0xb0, 0x1ff, 0x5, "6d584981cf7c5746729980c083ab54e02a3fd2c86a3fc6da15244fdb680d02c480e14a90fe97919c48c97a1ff6380f8f0f4a8c86fd5c20c0297d095bd352e06fc0a4ea98f15e01fb2cf8b33d249df31e7779d3be9167fbff6719a5c70098834b83a9453f3982f835e6f7046b0573971a3baad844496635ba95064155f5b78dfef3efd27e6936935053147597c99ef324d68faa1f5be3578dbb901f97"}], 0x2258, 0x40050}, 0x4000800) sendmsg$kcm(r3, &(0x7f0000001680)={&(0x7f00000003c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0x5, 0x4, "2d36b64c3e8529861120ad0c19f95dfffb5fef2e7157aeb2ea10da0fd6ab7587144ff8447e65f911356a8087a599a94c0be51881645d64f01d21f7e9c2885c"}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000440)="0548b67209007521ac7eff3f25c6fcae206217c2063bd9c70d28416d83708abd069981ae9a73d92c867067bc8a5255203f926d4aec523af4dd79acc0c71315f3c60e86d2c9f4df69be85d378037e190df026008737651f5a0c23ee60a80d9fe96bfb14edcf7404afff", 0x69}, {&(0x7f00000004c0)="b160d3b5966339cf3a50d03a9426f520326924b55288fc7979b3a506a5fb6918a2ce4556d9e109ef4344025ba7d10cfed244b6dba6809e9b1ba8ce33a977cba73987ff5a6edf2d", 0x47}, {&(0x7f0000000540)="e0e021de31d2b3da123d20f1e3b59fd9efec5c4b45972d73cfb7e9d1b26abcda82f087c96b2df9c729a9617e0c20c89178c17a763d40bdb4d104771753f48fcd15f1473418ee86052d7929547b1a61e1a0598aa20399abf74f20313f8518ed45e2533a67f3b1c2dfe1c70b83a2056569f105ba72812ac9b60c8c28007c21ac9b79b79641227f4ee4b5ec1f297c10ca19f9bdc3857a8367e3404ab7fcaf4ea58fd28eb9d46012eea7fb0caca15a09a2ec2de66b04a9f02289d4624b8d2fda71d9a978563c91", 0xc5}, {&(0x7f0000000640)="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", 0x1000}], 0x4, 0x0, 0x0, 0x8004}, 0x4000000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) recvmsg(r3, &(0x7f0000003bc0)={&(0x7f0000003b00)=@vsock={0x0, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000003b80)=[{&(0x7f00000017c0)=""/40, 0x28}], 0x1, 0x0, 0x0, 0x6}, 0x12000) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x80, &(0x7f0000000800), 0x0, &(0x7f00000000c0)=""/93, 0x5d}, 0x0) 2018/04/05 10:22:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:25 executing program 2: socketpair(0x15, 0x5, 0x8000f501, &(0x7f00000001c0)) 2018/04/05 10:22:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:26 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xa]}, 0x2c) 2018/04/05 10:22:26 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000006c0)=r1, 0x4) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x2, 0x3, 0x1, 0x0, 0x0, 0x9, 0x100, 0x2, 0x3, 0x5ad42ce7, 0x0, 0x6, 0x0, 0xc5, 0x9cc, 0x81, 0x5f3c, 0xffffffffffffffc0, 0x4, 0x3, 0x400, 0x8000, 0x1f, 0x1, 0x10000, 0x5, 0x3ff, 0x4, 0x3, 0xf5ac, 0x10000, 0x100, 0xa247, 0x4, 0x200, 0x3, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000004c0), 0x6}, 0x4000, 0x6, 0x9, 0x1, 0x319, 0xfffffffffffffffb, 0x192}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r4) recvmsg(r3, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:26 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c65309c", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:26 executing program 2: socketpair(0x15, 0x5, 0x80004b00, &(0x7f00000001c0)) 2018/04/05 10:22:26 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file-\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:26 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x18]}, 0x2c) 2018/04/05 10:22:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:26 executing program 2: socketpair(0x15, 0x5, 0x80002d01, &(0x7f00000001c0)) 2018/04/05 10:22:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:26 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000001e00000000000b00d985dbd11e590c48614a9ae641b3e2910000009500000000000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:26 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x2c) 2018/04/05 10:22:27 executing program 2: socketpair(0x15, 0x5, 0x800001ae, &(0x7f00000001c0)) 2018/04/05 10:22:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) recvmsg(r0, &(0x7f0000000440)={&(0x7f00000000c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/205, 0xcd}, {&(0x7f0000000280)=""/107, 0x6b}, {&(0x7f0000000300)=""/174, 0xae}], 0x3, &(0x7f00000003c0)=""/77, 0x4d, 0x6}, 0x12041) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001940)={&(0x7f0000001900)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001980)={r3, r4}) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=0xffffffff, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000004c0)={r1, r5}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000540)) sendmsg(r2, &(0x7f00000018c0)={&(0x7f0000000580)=@sco={0x1f, {0x3, 0x8f6f, 0xd9cd, 0x81, 0x7, 0x4}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000600)="adc85a1d7daa33a36c9a7c22bc56cf90707bbb900c7d647a24773a91442f0edee415ec0a8176cd5938626ae18b17ef2deeb353aa118fecb854e2fa598aff36aa918c2fab1fac713030875016ae2f7d257feeed7fd365243083cdcba8f56fa57a9972a7cbf2198db7f1006811566af61b06b3667937593ac99ff28570ececcd2e25027fb1fe7558a71f7fab1f446ad861c70df8a8a94c6e6d04cb2f34abb088d2db9f4daedaee19a0ac22cd612fc3cee88ad93171047b1b5e9a25189f2c03475484c1", 0xc2}, {&(0x7f0000000700)="1be87d5612cbfbacaf2ee679e4e04e229b2e184eea0df21c478bed9d710e6db4a42afcfd19b08ba3b054c68b0932cdc1b91cc6bc6bec2eecd885ab401b8137ce4e0e7bd6491e09e920a23d50e124422edc0e122ea3d3b422eabdee52dbf42401cf45ff5daf0a6e3ffd49a3a6f91fbfc5", 0x70}], 0x2, &(0x7f00000007c0)=[{0x1010, 0x10f, 0x9, "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"}, {0x90, 0x117, 0x8, "0f10a6992a12b9ad41d3e4cec6f04eb0f4d73171cc62eacca82ca7e009012b71a84aca1bd90d3759c69ab6d37f6df231cc4a288ae2656d60e62ea5309dd19fc156ac52f23edf961ba8c0a6b48cceba082df1798f71680c86e1fa716b835f702600f869fa6ba59fc3c70c7779de67611039468b2d25567e6ee901f95c11"}, {0x50, 0x11f, 0x9, "19be75d66f43d6279ffb726ba2aa15d108d05716966d35b207d1c80af2083f38b736f73b647ede5624141f26b9cdca3625eb5af61a4a12ef1758481c"}], 0x10f0}, 0x10) 2018/04/05 10:22:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x18000000]}, 0x2c) 2018/04/05 10:22:27 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000540)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) r2 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r2) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=r3, 0x4) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:27 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:27 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:27 executing program 2: socketpair(0x15, 0x5, 0x800001d7, &(0x7f00000001c0)) 2018/04/05 10:22:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xd000000]}, 0x2c) 2018/04/05 10:22:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8cffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:27 executing program 0: socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, &(0x7f0000000180)={0x0, 0x0}) close(r1) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x1000000]}, 0x2c) 2018/04/05 10:22:28 executing program 2: socketpair(0x15, 0x5, 0x80000152, &(0x7f00000001c0)) 2018/04/05 10:22:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r0) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffff8c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x8000000]}, 0x2c) 2018/04/05 10:22:28 executing program 2: socketpair(0x15, 0x5, 0x8000e600, &(0x7f00000001c0)) 2018/04/05 10:22:28 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) r2 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:28 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:28 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653091", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:29 executing program 2: socketpair(0x15, 0x5, 0x8000011e, &(0x7f00000001c0)) 2018/04/05 10:22:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x600]}, 0x2c) 2018/04/05 10:22:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:29 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000101f0000000000000001000080750a1800010000000000000000000080019352a0b8240970fc050095000000000000007d6e033202c99a91e7acdf73ca3b43a61f701448f283380140252de56d28c1a0c0750c3e84ea9372df96264377c0ee761f1bf30db89ed202089de29f78c287ee3f54517160d0412fe62197e7c94c6693dda5"], &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x6b, 0x64, &(0x7f0000000700)="c9d25bc61fe7fd6faf25616675fd8c41dd84f2c41e1b2537d2f6c0fa4e8eae570af22606a4233363fdf25ffc9e2a2a8649ad3cddf0607c18a61875698a6c03668d810197eb340fa8adbbf57c73446c7e1e42a68c62f1693025d9a95fee18967766e5a1acdb16d316114c69", &(0x7f0000000800)=""/100, 0xe0e, 0x5}, 0x28) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) 2018/04/05 10:22:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8cffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x2c) 2018/04/05 10:22:30 executing program 2: socketpair(0x15, 0x5, 0x800001fd, &(0x7f00000001c0)) 2018/04/05 10:22:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:30 executing program 6: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./.ile0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:30 executing program 0: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0/file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000780)={&(0x7f00000006c0)='./file0\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0x0, 0x0}) r3 = socket$kcm(0x29, 0x5, 0x0) close(r2) socketpair(0x1, 0x2, 0x1000000000, &(0x7f00000004c0)={0xffffffffffffffff}) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500)=0xffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00', r4}, 0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000580)=0x2, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r5, 0x5, 0x1}, 0x14) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg$kcm(r3, &(0x7f0000001740)={&(0x7f00000000c0)=@nfc_llcp={0x27, 0x0, 0x0, 0x2, 0x9, 0x7, "10ed894b4f23b0e92e748afb3a6dfb3670cb5082501294bd44f25bb1030bdab4a201718dd80402eccfbbf3963246c4496ebe7cb99f588474591ce2241cf425", 0x3f}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000000)="1364d88c82589848ebba2b89435efaa8f203ed2b3cacc1962a0b96506c6225395b9819d281a0", 0x26}, {&(0x7f0000000140)="130be303551c43a56457ff49e0848819653b71dcbaa3b51858a4be5a0bdac9783603c158ac907552952f3d118b1eefa9bd70530e47aea3d5eeb0517760dec1825370adfb", 0x44}, {&(0x7f00000001c0)="5baf9ee31df09f8476b25a3b8d20885d5ab972c8e5a0fbcdbd0256067c39ca901bfc5efef24b62b690024bd597adc845c13d0faa7e2fb0438a966a28a4db029ccffe6491c49556827fa81c64f9f3287a3b79603f1770be99e4dd507418f75057", 0x60}, {&(0x7f0000000280)="76b66de3b7c55149d988db16ad4a91c4604ee3cf55023f8466deedbf33a71d6d8d925888f2173cad9e13d547182a28e5eb9c2c4ae69fdd", 0x37}], 0x4, &(0x7f0000002c00)=ANY=[], 0x0, 0x40000}, 0x44080) r7 = gettid() r8 = perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x7, 0x3ff, 0x3, 0x4, 0x0, 0x1, 0x4, 0x5, 0x81, 0x6, 0x1, 0x8, 0x1, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x9, 0x3, 0xbe0b, 0x0, 0x8, 0x0, 0x3, 0x100000000, 0x8000, 0x2, 0x8, 0x1ff, 0x80, 0x4, 0x6, 0x4, 0x1f, 0x9, 0x0, 0x5b, 0x1, @perf_bp={&(0x7f0000000400)}, 0x20288, 0x1, 0x6, 0x7, 0x2, 0x7, 0x3}, 0x0, 0xc, r6, 0x1) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x7, 0x7ff, 0x4, 0x0, 0x0, 0x6, 0x8000, 0x8, 0x200, 0x212, 0x6, 0x0, 0xded4, 0x1, 0x2f, 0x8, 0x4, 0x5, 0x462, 0x30000000, 0x540, 0x6, 0x4, 0x8, 0x7, 0x0, 0xf5a4, 0x3, 0x8000, 0xeb2, 0x1, 0x9, 0x1, 0x7fff, 0x5, 0x46b, 0x0, 0x7, 0x5, @perf_config_ext={0x80, 0x1}, 0x200, 0x81, 0xff, 0x0, 0x8, 0x3, 0x7}, r7, 0xa, r8, 0x8) 2018/04/05 10:22:30 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:30 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:30 executing program 2: socketpair(0x15, 0x5, 0x80000024, &(0x7f00000001c0)) 2018/04/05 10:22:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xd00000000000000]}, 0x2c) 2018/04/05 10:22:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf6ffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x2c) 2018/04/05 10:22:30 executing program 0: close(0xffffffffffffffff) socketpair(0x0, 0x3, 0x8000, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000180)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000100)) socketpair$ax25(0x3, 0x2, 0xcc, &(0x7f00000000c0)) recvmsg(0xffffffffffffffff, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf6ffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:30 executing program 2: socketpair(0x15, 0x5, 0x8000a900, &(0x7f00000001c0)) 2018/04/05 10:22:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xa00]}, 0x2c) 2018/04/05 10:22:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:31 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x2, 0x0, 0x9, 0x7fff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3e0b, 0x100, 0x100000001, 0x100000001, 0x9, 0x5, 0x6, 0x8, 0xfffffffffffffffd, 0x9, 0x6, 0x1f, 0x3ff, 0x800, 0x40000000, 0x8, 0x8, 0x6, 0xfffffffffffffffa, 0xffffffff80000000, 0x1, 0x2000000000000000, 0x4, 0x6, 0xaea, 0xda, 0x9, 0x0, 0x100000001, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x10000, 0x80, 0x9, 0x7, 0x0, 0xfffffffffffffe01, 0x5}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r2) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:31 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:31 executing program 2: socketpair(0x15, 0x5, 0x8000ff01, &(0x7f00000001c0)) 2018/04/05 10:22:31 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:31 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:31 executing program 2: socketpair(0x15, 0x5, 0x8000af01, &(0x7f00000001c0)) 2018/04/05 10:22:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x900]}, 0x2c) 2018/04/05 10:22:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:31 executing program 6 (fault-call:4 fault-nth:0): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x1, 0x3ff, 0x3f, 0x0, 0xffffffffffffff9c, 0x80}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r2, &(0x7f0000000280)="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"}, 0x10) 2018/04/05 10:22:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x6]}, 0x2c) [ 407.736829] FAULT_INJECTION: forcing a failure. [ 407.736829] name failslab, interval 1, probability 0, space 0, times 0 [ 407.748134] CPU: 1 PID: 29917 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 407.754957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.764305] Call Trace: [ 407.766884] dump_stack+0x1b9/0x29f [ 407.770507] ? arch_local_irq_restore+0x52/0x52 [ 407.775172] should_fail.cold.4+0xa/0x1a [ 407.779226] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 407.784334] ? lock_downgrade+0x8e0/0x8e0 [ 407.788467] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 407.793989] ? proc_fail_nth_write+0x96/0x1f0 [ 407.798467] ? proc_cwd_link+0x1d0/0x1d0 [ 407.802517] ? find_held_lock+0x36/0x1c0 [ 407.806577] ? check_same_owner+0x320/0x320 [ 407.810882] ? __lock_is_held+0xb5/0x140 [ 407.814951] ? rcu_note_context_switch+0x710/0x710 [ 407.819891] should_failslab+0x124/0x180 [ 407.823981] __kmalloc_track_caller+0x2c4/0x760 [ 407.828670] ? strncpy_from_user+0x500/0x500 [ 407.833094] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 407.838644] ? strndup_user+0x77/0xd0 [ 407.842459] memdup_user+0x2c/0xa0 [ 407.846026] strndup_user+0x77/0xd0 [ 407.849667] ksys_mount+0x3c/0x140 [ 407.853220] SyS_mount+0x35/0x50 [ 407.856579] ? ksys_mount+0x140/0x140 [ 407.860368] do_syscall_64+0x29e/0x9d0 [ 407.864239] ? vmalloc_sync_all+0x30/0x30 [ 407.868374] ? _raw_spin_unlock_irq+0x27/0x70 [ 407.872854] ? finish_task_switch+0x1ca/0x820 [ 407.877335] ? syscall_return_slowpath+0x5c0/0x5c0 [ 407.882250] ? syscall_return_slowpath+0x30f/0x5c0 2018/04/05 10:22:31 executing program 2: socketpair(0x15, 0x5, 0x8000001b, &(0x7f00000001c0)) 2018/04/05 10:22:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:31 executing program 2: socketpair(0x15, 0x5, 0x800001a9, &(0x7f00000001c0)) 2018/04/05 10:22:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:31 executing program 2: socketpair(0x15, 0x5, 0x8000ae01, &(0x7f00000001c0)) [ 407.887174] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 407.892525] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.897358] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 407.902531] RIP: 0033:0x4552d9 [ 407.905703] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 407.913398] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 407.920658] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 407.927910] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 407.935169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 407.942418] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000000 2018/04/05 10:22:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000800)) socketpair(0x11, 0x7, 0x80000001, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000140)=@l2={0x1f, 0xe, {0x1fde, 0x5, 0x10001, 0x5f, 0x7fffffff, 0x3ff}, 0x9, 0x4}, 0x80, &(0x7f0000000440)=[{&(0x7f00000001c0)="3b92fd5d51bbe163f82658f35f0f31fb462b7ee6b42297072bf9e2cea41d8260577b478ac971898f1ca310b873d9e03ee94c597392b49eb5c8cd6c505025d68aee419f5a07a849ef295c2ee89e2c42891e16b8a76442c8606949541f189c67484b8add4848", 0x65}, {&(0x7f0000000280)="63cc3cc98cf79f1a7752d495618a4da0c7b8d658762d25a71342bb610ae9e33fff6f36905e77bfc51f58a29a17f8ce555bca9ee420e8ce59515c219be4fecbb908937d098a93c0c9113711bfdb21e64bebb84cd5b3f24b63b943c9e8ef3eebebc08cf10829129674d379223efa735a6a8a45fefe22b3153d65beb259e648d72e0bbca59075d7595859b387f1d1e95ee9dc99765759769f9d5f2a3da25659843c09258e04073c55315dc8f1d78fc0d2ff3ea10210d3f34bfb167854ba9534188e27d3e0aa47ece4297b4273327b97564bcb4e67dd5c", 0xd5}, {&(0x7f0000000380)="3cbd8985d5bc958424413696f7484b3443b96a6b994bc7375727766ae31ff15a5bb324c7453a320208aa11b6a9be58da6f20ab4b769176fe0795c6aaa487508b8b876772227a8209900c2b1cec9768d6267049bbbd785eb4c1c830c642271ae70bd00beecdbe1e242f6974de125b00e2f176c9874874440297acb3b79c817be1447d5c5a07cc9109852294bad9", 0x8d}], 0x3, &(0x7f0000001f80)=ANY=[@ANYBLOB="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"], 0x1a8, 0x20000000}, 0x8010) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r1, 0x0, 0x2a, 0xd0, &(0x7f0000000680)="38cff69a37e213ebf1dd144f3b723106577c3ace6e6d964ecadd8b153358a59eee53faa97d7b3a5462f5", &(0x7f00000006c0)=""/208, 0x80000000, 0x6}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000100)=0x5) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x80, &(0x7f0000001c80)=[{&(0x7f0000000500)=""/89, 0x59}, {&(0x7f0000000580)=""/185, 0xb9}, {&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/71, 0x47}, {&(0x7f0000001b00)=""/190, 0xbe}, {&(0x7f0000001bc0)=""/182, 0xb6}], 0x6, &(0x7f0000000480)=""/93, 0x5d}, 0x0) 2018/04/05 10:22:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:32 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xe]}, 0x2c) 2018/04/05 10:22:32 executing program 6 (fault-call:4 fault-nth:1): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:32 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:32 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530b6", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:32 executing program 2: socketpair(0x15, 0x5, 0x80003b01, &(0x7f00000001c0)) [ 408.720062] FAULT_INJECTION: forcing a failure. [ 408.720062] name failslab, interval 1, probability 0, space 0, times 0 [ 408.731324] CPU: 0 PID: 29963 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 408.738148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.747478] Call Trace: [ 408.750051] dump_stack+0x1b9/0x29f [ 408.753664] ? arch_local_irq_restore+0x52/0x52 [ 408.758326] ? __save_stack_trace+0x7e/0xd0 [ 408.762639] should_fail.cold.4+0xa/0x1a [ 408.766688] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 408.771773] ? kasan_kmalloc+0xc4/0xe0 [ 408.775651] ? __kmalloc_track_caller+0x14a/0x760 [ 408.780474] ? memdup_user+0x2c/0xa0 [ 408.784177] ? strndup_user+0x77/0xd0 [ 408.787964] ? graph_lock+0x170/0x170 [ 408.791751] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 408.797276] ? proc_fail_nth_write+0x96/0x1f0 [ 408.801759] ? proc_cwd_link+0x1d0/0x1d0 [ 408.805806] ? find_held_lock+0x36/0x1c0 [ 408.809863] ? check_same_owner+0x320/0x320 [ 408.814166] ? lock_release+0xa10/0xa10 2018/04/05 10:22:32 executing program 2: socketpair(0x15, 0x5, 0x800001eb, &(0x7f00000001c0)) 2018/04/05 10:22:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 408.818134] ? rcu_note_context_switch+0x710/0x710 [ 408.823056] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 408.828057] ? __check_object_size+0x95/0x5d9 [ 408.832537] should_failslab+0x124/0x180 [ 408.836582] __kmalloc_track_caller+0x2c4/0x760 [ 408.841238] ? strncpy_from_user+0x500/0x500 [ 408.845629] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.851155] ? strndup_user+0x77/0xd0 [ 408.854938] memdup_user+0x2c/0xa0 [ 408.858458] strndup_user+0x77/0xd0 [ 408.862076] ksys_mount+0x73/0x140 [ 408.865611] SyS_mount+0x35/0x50 [ 408.868962] ? ksys_mount+0x140/0x140 [ 408.872747] do_syscall_64+0x29e/0x9d0 [ 408.876635] ? vmalloc_sync_all+0x30/0x30 [ 408.880768] ? _raw_spin_unlock_irq+0x27/0x70 [ 408.885248] ? finish_task_switch+0x1ca/0x820 [ 408.889724] ? syscall_return_slowpath+0x5c0/0x5c0 [ 408.894633] ? syscall_return_slowpath+0x30f/0x5c0 [ 408.899547] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 408.904894] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 408.909723] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 408.914896] RIP: 0033:0x4552d9 [ 408.918068] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 408.925758] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 408.933008] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 408.940258] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 408.947507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 408.954755] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000001 2018/04/05 10:22:33 executing program 2: socketpair(0x15, 0x5, 0x800001b1, &(0x7f00000001c0)) 2018/04/05 10:22:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x2c) 2018/04/05 10:22:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:33 executing program 6 (fault-call:4 fault-nth:2): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:33 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c65309e", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r1}) sendmsg$kcm(r2, &(0x7f0000001540)={&(0x7f00000000c0)=@ax25={0x3, {"08be4e6d76dc05"}, 0x7}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000000140)="ef4211ec4796e32954dad6581d2ed99fd847369f19c1471bf905b0868b6855813ae8d556036d29dcc8b194f6d85999eb6635ea4228e9f421389d2356ab5310901baad575745e39d311611a67f5048c067f18ffe02a0f2d1c436fac02f4b0e793d965449414214d4208a87c306cfa7dbbc84ed4bb921d8656bb3ab43b3ea484dde7fa96094f21342293f6", 0x8a}, {&(0x7f0000001280)="51bce5068a4990ba9c4fce8cd43ec7240f103092368361cec4013f9d1ee64e6da21fb37f39c3aaaf63951d93a7ebdff891964f2e2f5485023c4bdff5a3a10accdfb44050c7f41801317ae65f659a0bb2678626e8c819d9aea233c9b5d5deb3c5ac979b", 0x63}], 0x3, &(0x7f0000001300)=[{0x108, 0x10f, 0xff, "b0c11e99e187b9d5143ee57ccb2cc5a4ab17051f8ef21d9359fbcbc3f6500a908aa898d6585fc7d8b5ca60bda3d18be25f27ac79b83d4bb167453057b472657421d8bcb17893dfc81586f69875d6323007a7554227208cc692ce0702597ac114aa982d6ffceb77df65c584220e9fdbef394be413133036266c1cfcb5318f4895a7b0235a48f57f2a766b6a07fd6264eee268f12dc70ccd64f17467d7cd4f33edceb48079d2f19ff4d552a32cffab2debba77c5871c1d2f4a89ff2a890257c6e9108c6bd8f921f39afb11c795cd133695be81771b0ca3ffd730786722440c9c356dbf6c6853c3a75fd54670d2469f6891eb"}, {0x100, 0x10d, 0x10001, "a0e606063d3c66e745cb2adad4377b963ca5cef69614a8e8aa7042398fb5ece93f6dc289e58575b5c4158b99af70c3b8a8238c693d43f10a6a77fe8098fd678d6be31ea95443fc7c094acbd2915ad96c14a20163a3b40d7b5fcfdef760be8928392c60227219949cd80b49e0a1682625313319995ce0384731430671e5164c0f8a632016d80ea1e8803c0cfed70112d40fca7baeca92f34b433c16b8c89ac1155a0df27f99b8dd668c00dfdfc60cdc5ddb5a56b306cd95ab88ff0ee364825498dde73e0751ff0cdaa86a5f37f20530978480128f38e548fef58078aed5b04c053a51f11e8f558ac73c"}], 0x208, 0x10}, 0x80) 2018/04/05 10:22:33 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 409.826860] FAULT_INJECTION: forcing a failure. [ 409.826860] name failslab, interval 1, probability 0, space 0, times 0 [ 409.838196] CPU: 1 PID: 30002 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 409.845038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.854397] Call Trace: [ 409.856993] dump_stack+0x1b9/0x29f [ 409.860636] ? arch_local_irq_restore+0x52/0x52 [ 409.865326] should_fail.cold.4+0xa/0x1a [ 409.869403] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 409.874520] ? kasan_kmalloc+0xc4/0xe0 [ 409.878417] ? memdup_user+0x2c/0xa0 [ 409.882139] ? strndup_user+0x77/0xd0 [ 409.885952] ? graph_lock+0x170/0x170 [ 409.889770] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 409.895155] ? find_held_lock+0x36/0x1c0 [ 409.899250] ? check_same_owner+0x320/0x320 [ 409.903583] ? lock_release+0xa10/0xa10 [ 409.907574] ? rcu_note_context_switch+0x710/0x710 [ 409.912514] ? __check_object_size+0x95/0x5d9 [ 409.917025] should_failslab+0x124/0x180 [ 409.921097] kmem_cache_alloc_trace+0x2cb/0x780 [ 409.925779] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 409.931333] ? _copy_from_user+0xdf/0x150 [ 409.935507] copy_mount_options+0x5f/0x380 [ 409.939761] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 409.945324] ksys_mount+0xd0/0x140 [ 409.948887] SyS_mount+0x35/0x50 [ 409.952271] ? ksys_mount+0x140/0x140 [ 409.956092] do_syscall_64+0x29e/0x9d0 [ 409.959990] ? vmalloc_sync_all+0x30/0x30 [ 409.964157] ? _raw_spin_unlock_irq+0x27/0x70 [ 409.968667] ? finish_task_switch+0x1ca/0x820 [ 409.973184] ? syscall_return_slowpath+0x5c0/0x5c0 [ 409.978129] ? syscall_return_slowpath+0x30f/0x5c0 [ 409.983079] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 409.988472] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 409.993345] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 409.998544] RIP: 0033:0x4552d9 [ 410.001741] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 410.009465] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 410.016746] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/04/05 10:22:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x11]}, 0x2c) 2018/04/05 10:22:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:33 executing program 2: socketpair(0x15, 0x5, 0x80000055, &(0x7f00000001c0)) 2018/04/05 10:22:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xe00]}, 0x2c) 2018/04/05 10:22:33 executing program 2: socketpair(0x15, 0x5, 0x800000fc, &(0x7f00000001c0)) 2018/04/05 10:22:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 410.024025] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 410.031340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 410.038621] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000002 2018/04/05 10:22:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair(0xf, 0x3, 0x5, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0x28, &(0x7f00000000c0)}, 0x10) 2018/04/05 10:22:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:34 executing program 2: socketpair(0x15, 0x5, 0x80000166, &(0x7f00000001c0)) 2018/04/05 10:22:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x5000000]}, 0x2c) 2018/04/05 10:22:34 executing program 6 (fault-call:4 fault-nth:3): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:34 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair(0x9, 0xa, 0x7283, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x101) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) 2018/04/05 10:22:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:34 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 410.885715] FAULT_INJECTION: forcing a failure. [ 410.885715] name failslab, interval 1, probability 0, space 0, times 0 [ 410.897060] CPU: 0 PID: 30052 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 410.903916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.913274] Call Trace: [ 410.915889] dump_stack+0x1b9/0x29f [ 410.919537] ? arch_local_irq_restore+0x52/0x52 [ 410.924220] ? should_fail.cold.4+0x5/0x1a [ 410.928463] ? dump_stack+0xf/0x29f [ 410.932100] should_fail.cold.4+0xa/0x1a [ 410.936175] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 410.941293] ? kasan_check_read+0x11/0x20 [ 410.945456] ? rcu_is_watching+0x85/0x140 [ 410.949617] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 410.954826] ? find_held_lock+0x36/0x1c0 [ 410.958978] ? check_same_owner+0x320/0x320 [ 410.963318] ? rcu_note_context_switch+0x710/0x710 [ 410.968264] ? save_stack+0xa9/0xd0 [ 410.971916] should_failslab+0x124/0x180 [ 410.975997] kmem_cache_alloc+0x2af/0x760 [ 410.980154] ? proc_cwd_link+0x1d0/0x1d0 [ 410.984239] getname_flags+0xd0/0x5a0 [ 410.988060] user_path_at_empty+0x2d/0x50 [ 410.992225] do_mount+0x172/0x3070 [ 410.995782] ? copy_mount_string+0x40/0x40 [ 411.000032] ? rcu_pm_notify+0xc0/0xc0 [ 411.003944] ? copy_mount_options+0x5f/0x380 [ 411.008367] ? rcu_read_lock_sched_held+0x108/0x120 [ 411.013398] ? kmem_cache_alloc_trace+0x616/0x780 [ 411.018261] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 411.023810] ? _copy_from_user+0xdf/0x150 [ 411.027979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/04/05 10:22:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:34 executing program 2: socketpair(0x15, 0x5, 0x80000155, &(0x7f00000001c0)) 2018/04/05 10:22:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x300]}, 0x2c) [ 411.033530] ? copy_mount_options+0x285/0x380 [ 411.038038] ksys_mount+0x12d/0x140 [ 411.041672] SyS_mount+0x35/0x50 [ 411.045051] ? ksys_mount+0x140/0x140 [ 411.048874] do_syscall_64+0x29e/0x9d0 [ 411.052769] ? vmalloc_sync_all+0x30/0x30 [ 411.056924] ? _raw_spin_unlock_irq+0x27/0x70 [ 411.061426] ? finish_task_switch+0x1ca/0x820 [ 411.065937] ? syscall_return_slowpath+0x5c0/0x5c0 [ 411.070883] ? syscall_return_slowpath+0x30f/0x5c0 [ 411.075832] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 411.081223] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/05 10:22:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 411.086085] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 411.091283] RIP: 0033:0x4552d9 [ 411.094478] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 411.102198] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 411.109475] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 411.116748] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 411.124025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/05 10:22:34 executing program 2: socketpair(0x15, 0x5, 0x8000b900, &(0x7f00000001c0)) [ 411.131303] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000003 2018/04/05 10:22:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x2]}, 0x2c) 2018/04/05 10:22:35 executing program 6 (fault-call:4 fault-nth:4): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:35 executing program 2: socketpair(0x15, 0x5, 0x80006e00, &(0x7f00000001c0)) 2018/04/05 10:22:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair(0x1b, 0x2, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000180)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000100)=0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000000c0)={r0}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) 2018/04/05 10:22:35 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:35 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530e0", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 411.975814] FAULT_INJECTION: forcing a failure. [ 411.975814] name failslab, interval 1, probability 0, space 0, times 0 [ 411.987257] CPU: 0 PID: 30098 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 411.994108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.003477] Call Trace: [ 412.006090] dump_stack+0x1b9/0x29f [ 412.009731] ? arch_local_irq_restore+0x52/0x52 [ 412.014416] ? find_held_lock+0x36/0x1c0 [ 412.018497] should_fail.cold.4+0xa/0x1a 2018/04/05 10:22:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x10]}, 0x2c) 2018/04/05 10:22:35 executing program 2: socketpair(0x15, 0x5, 0x80001d00, &(0x7f00000001c0)) [ 412.022569] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 412.027682] ? kasan_check_read+0x11/0x20 [ 412.031840] ? rcu_is_watching+0x85/0x140 [ 412.036004] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 412.041215] ? find_held_lock+0x36/0x1c0 [ 412.045308] ? check_same_owner+0x320/0x320 [ 412.049643] ? rcu_note_context_switch+0x710/0x710 [ 412.054588] ? save_stack+0xa9/0xd0 [ 412.058232] should_failslab+0x124/0x180 [ 412.062311] kmem_cache_alloc+0x2af/0x760 [ 412.066472] ? find_held_lock+0x36/0x1c0 [ 412.070560] getname_flags+0xd0/0x5a0 2018/04/05 10:22:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 412.074384] user_path_at_empty+0x2d/0x50 [ 412.078551] do_mount+0x172/0x3070 [ 412.082106] ? do_raw_spin_unlock+0x9e/0x2e0 [ 412.086541] ? copy_mount_string+0x40/0x40 [ 412.090804] ? rcu_pm_notify+0xc0/0xc0 [ 412.094719] ? copy_mount_options+0x5f/0x380 [ 412.099146] ? rcu_read_lock_sched_held+0x108/0x120 [ 412.104209] ? kmem_cache_alloc_trace+0x616/0x780 [ 412.109079] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 412.114652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.120210] ? copy_mount_options+0x285/0x380 [ 412.125427] ksys_mount+0x12d/0x140 [ 412.129076] SyS_mount+0x35/0x50 [ 412.132462] ? ksys_mount+0x140/0x140 [ 412.136282] do_syscall_64+0x29e/0x9d0 [ 412.140188] ? vmalloc_sync_all+0x30/0x30 [ 412.144529] ? _raw_spin_unlock_irq+0x27/0x70 [ 412.149042] ? finish_task_switch+0x1ca/0x820 [ 412.153558] ? syscall_return_slowpath+0x5c0/0x5c0 [ 412.158506] ? syscall_return_slowpath+0x30f/0x5c0 [ 412.163455] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 412.168838] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/05 10:22:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:35 executing program 2: socketpair(0x15, 0x5, 0x8000df00, &(0x7f00000001c0)) [ 412.173700] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 412.178890] RIP: 0033:0x4552d9 [ 412.182078] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 412.189801] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 412.197084] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 412.204372] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 412.211657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 412.218944] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000004 2018/04/05 10:22:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x2c) 2018/04/05 10:22:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:35 executing program 6 (fault-call:4 fault-nth:5): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 412.366562] FAULT_INJECTION: forcing a failure. [ 412.366562] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 412.378412] CPU: 0 PID: 30141 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 412.385256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.394617] Call Trace: [ 412.397223] dump_stack+0x1b9/0x29f [ 412.400868] ? arch_local_irq_restore+0x52/0x52 [ 412.405550] ? debug_check_no_locks_freed+0x310/0x310 [ 412.410768] should_fail.cold.4+0xa/0x1a 2018/04/05 10:22:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:35 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg$kcm(r1, &(0x7f0000000080)={&(0x7f00000000c0)=@un=@abs={0x1}, 0x3, &(0x7f0000000040), 0x3d}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) recvmsg(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f0000001780)=[{&(0x7f00000003c0)=""/214, 0xd6}, {&(0x7f00000004c0)=""/83, 0x53}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/10, 0xa}, {&(0x7f0000001580)=""/144, 0x90}, {&(0x7f0000001640)=""/83, 0x53}, {&(0x7f00000016c0)=""/187, 0xbb}], 0x7, &(0x7f0000001800)=""/204, 0xcc, 0x7}, 0x10160) close(r3) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001a40)) recvmsg(r3, &(0x7f0000000380)={&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/236, 0xec}], 0x1, &(0x7f0000000280)=""/249, 0xf9, 0x4}, 0x40000140) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001940)) [ 412.414843] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 412.419965] ? debug_check_no_locks_freed+0x310/0x310 [ 412.425163] ? perf_trace_lock+0x900/0x900 [ 412.429402] ? print_usage_bug+0xc0/0xc0 [ 412.433477] ? graph_lock+0x170/0x170 [ 412.437290] ? perf_trace_lock_acquire+0xe3/0x980 [ 412.442146] ? print_usage_bug+0xc0/0xc0 [ 412.446232] ? perf_trace_lock_acquire+0xe3/0x980 [ 412.451087] ? find_held_lock+0x36/0x1c0 [ 412.455167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.460712] ? should_fail+0x21b/0xbcd 2018/04/05 10:22:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xffffffffffffff43}, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x3, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r2, &(0x7f00000000c0)="24883360965f42bcc6d73ab52b4aea66d969d70a4a37a48d6acba760f8b1f17d612d2d3063d1e83563fa2b0da3ffc94d8f93da1bb9eb", &(0x7f0000000100)="bebe989c29c6cdaaf75f455234a9222f79c21788b691ae"}, 0x20) [ 412.464616] __alloc_pages_nodemask+0x34e/0xd70 [ 412.469297] ? kasan_check_read+0x11/0x20 [ 412.473459] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 412.478505] ? find_held_lock+0x36/0x1c0 [ 412.482617] ? check_same_owner+0x320/0x320 [ 412.486960] cache_grow_begin+0x72/0x6c0 [ 412.491037] kmem_cache_alloc+0x689/0x760 [ 412.495219] ? find_held_lock+0x36/0x1c0 [ 412.499300] getname_flags+0xd0/0x5a0 [ 412.503241] user_path_at_empty+0x2d/0x50 [ 412.507413] do_mount+0x172/0x3070 [ 412.510962] ? do_raw_spin_unlock+0x9e/0x2e0 [ 412.515387] ? copy_mount_string+0x40/0x40 [ 412.519635] ? rcu_pm_notify+0xc0/0xc0 [ 412.523545] ? copy_mount_options+0x5f/0x380 [ 412.527968] ? rcu_read_lock_sched_held+0x108/0x120 [ 412.533000] ? kmem_cache_alloc_trace+0x616/0x780 [ 412.537856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 412.543407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.548943] ? copy_mount_options+0x285/0x380 [ 412.553444] ksys_mount+0x12d/0x140 [ 412.557080] SyS_mount+0x35/0x50 [ 412.560449] ? ksys_mount+0x140/0x140 [ 412.564265] do_syscall_64+0x29e/0x9d0 [ 412.568154] ? vmalloc_sync_all+0x30/0x30 [ 412.572310] ? _raw_spin_unlock_irq+0x27/0x70 [ 412.576812] ? finish_task_switch+0x1ca/0x820 [ 412.581320] ? syscall_return_slowpath+0x5c0/0x5c0 [ 412.586259] ? syscall_return_slowpath+0x30f/0x5c0 [ 412.591192] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 412.596545] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 412.601390] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 412.606571] RIP: 0033:0x4552d9 [ 412.609760] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 412.617451] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 412.624711] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 412.631970] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 412.639226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 412.646496] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000005 2018/04/05 10:22:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x9]}, 0x2c) 2018/04/05 10:22:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:36 executing program 6 (fault-call:4 fault-nth:6): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:36 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:36 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530fe", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffff9c, 0x28, &(0x7f0000000200)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={r2, 0x1, 0x10}, 0xc) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) recvmsg(r0, &(0x7f00000001c0)={&(0x7f00000000c0)=@nfc_llcp, 0x80, &(0x7f0000000000)=[{&(0x7f0000000140)=""/121, 0x79}], 0x1, &(0x7f00000003c0)=""/162, 0xa2, 0x401}, 0x2040) 2018/04/05 10:22:36 executing program 2: socketpair(0x15, 0x5, 0x800000e7, &(0x7f00000001c0)) [ 413.089147] FAULT_INJECTION: forcing a failure. [ 413.089147] name failslab, interval 1, probability 0, space 0, times 0 [ 413.100494] CPU: 0 PID: 30178 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 413.107335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.116741] Call Trace: [ 413.119338] dump_stack+0x1b9/0x29f [ 413.122993] ? arch_local_irq_restore+0x52/0x52 [ 413.127673] ? finish_task_switch+0x1ca/0x820 [ 413.132185] ? finish_task_switch+0x182/0x820 2018/04/05 10:22:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:36 executing program 0: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000140)={r1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) [ 413.136709] should_fail.cold.4+0xa/0x1a [ 413.140788] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 413.145907] ? __schedule+0x80f/0x1e40 [ 413.149817] ? __sched_text_start+0x8/0x8 [ 413.153975] ? find_held_lock+0x36/0x1c0 [ 413.158074] ? check_same_owner+0x320/0x320 [ 413.162404] ? kasan_slab_free+0xe/0x10 [ 413.166390] ? kmem_cache_free+0x86/0x2d0 [ 413.170547] ? putname+0xf2/0x130 [ 413.174011] ? do_mount+0x172/0x3070 [ 413.177736] ? ksys_mount+0x12d/0x140 [ 413.181543] ? SyS_mount+0x35/0x50 [ 413.185092] ? do_syscall_64+0x29e/0x9d0 2018/04/05 10:22:36 executing program 2: socketpair(0x15, 0x5, 0x80000201, &(0x7f00000001c0)) [ 413.189167] should_failslab+0x124/0x180 [ 413.193240] kmem_cache_alloc+0x2af/0x760 [ 413.197400] ? perf_trace_lock_acquire+0xe3/0x980 [ 413.202256] alloc_vfsmnt+0xe0/0x9d0 [ 413.205976] ? mnt_free_id.isra.27+0x60/0x60 [ 413.210401] ? kasan_check_read+0x11/0x20 [ 413.214564] ? graph_lock+0x170/0x170 [ 413.218376] ? rcu_pm_notify+0xc0/0xc0 [ 413.222273] ? trace_hardirqs_off+0xd/0x10 [ 413.226530] ? putname+0xf2/0x130 [ 413.229998] ? putname+0xf2/0x130 [ 413.233465] ? find_held_lock+0x36/0x1c0 2018/04/05 10:22:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x6, 0x7ca1, 0x9, 0x1000, 0x0, 0x401, 0x800, 0x1, 0x7, 0x7fffffff, 0x4, 0x0, 0x6, 0x1, 0x1, 0xfffffffffffff1ac, 0xa6e, 0x3860, 0x9, 0x7, 0x40, 0x80000000, 0x1, 0x3, 0x200, 0xfd, 0x7fff, 0x1, 0x5c, 0x3ff, 0xc3b8, 0x94, 0x80000001, 0x3, 0x8, 0x39, 0x0, 0xfa, 0x2, @perf_config_ext={0x3, 0x2}, 0x20000, 0x6, 0x1, 0x7, 0x4, 0x1a, 0xffffffffffffffff}, 0x0, 0x2, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair$inet6(0xa, 0x0, 0x4, &(0x7f00000005c0)) close(r0) socketpair$inet(0x2, 0x6, 0xfffffffffffff6f4, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$inet(0x2, 0x8000f, 0x3, &(0x7f0000000000)) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000000100)=@can, 0xfffffffffffffed3, &(0x7f00000004c0)=[{&(0x7f0000000180)=""/21}, {&(0x7f0000000280)=""/183}, {&(0x7f00000001c0)=""/107}, {&(0x7f0000000340)=""/140}, {&(0x7f0000000400)=""/147}], 0xbb, &(0x7f0000000040)=""/93, 0x5d}, 0x0) 2018/04/05 10:22:36 executing program 2: socketpair(0x15, 0x5, 0x800000a2, &(0x7f00000001c0)) [ 413.237552] ? lock_downgrade+0x8e0/0x8e0 [ 413.241721] ? module_unload_free+0x5b0/0x5b0 [ 413.246228] ? lock_release+0xa10/0xa10 [ 413.250661] vfs_kern_mount.part.34+0x88/0x4d0 [ 413.255263] ? may_umount+0xb0/0xb0 [ 413.258897] ? _raw_read_unlock+0x22/0x30 [ 413.263055] ? __get_fs_type+0x97/0xc0 [ 413.266970] do_mount+0x564/0x3070 [ 413.270528] ? copy_mount_string+0x40/0x40 [ 413.274778] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.279555] ? retint_kernel+0x10/0x10 [ 413.283466] ? copy_mount_options+0x1f0/0x380 [ 413.287975] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 413.292841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.298389] ? copy_mount_options+0x285/0x380 [ 413.302899] ksys_mount+0x12d/0x140 [ 413.306537] SyS_mount+0x35/0x50 [ 413.309916] ? ksys_mount+0x140/0x140 [ 413.313731] do_syscall_64+0x29e/0x9d0 [ 413.317622] ? vmalloc_sync_all+0x30/0x30 [ 413.321778] ? kasan_check_write+0x14/0x20 [ 413.326025] ? syscall_return_slowpath+0x5c0/0x5c0 [ 413.330970] ? syscall_return_slowpath+0x30f/0x5c0 2018/04/05 10:22:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xd00]}, 0x2c) 2018/04/05 10:22:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:36 executing program 2: socketpair(0x15, 0x5, 0x80000169, &(0x7f00000001c0)) [ 413.335913] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 413.341285] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.346144] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 413.351333] RIP: 0033:0x4552d9 [ 413.354523] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 413.362245] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 413.369517] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 413.376785] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 413.384071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 413.391340] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000006 2018/04/05 10:22:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) r2 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003cc0)={&(0x7f0000003800)=@can={0x0, 0x0}, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000003880)=""/176, 0xb0}, {&(0x7f0000003940)=""/57, 0x39}, {&(0x7f0000003980)=""/119, 0x77}, {&(0x7f0000003a00)=""/91, 0x5b}, {&(0x7f0000003a80)=""/229, 0xe5}, {&(0x7f0000003b80)=""/5, 0x5}], 0x6, &(0x7f0000003c40)=""/81, 0x51, 0x9}, 0x40000000) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x2, 0x5b, 0x2, 0xc, r2, 0x5fa5ef7c}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x28, &(0x7f0000000100)}, 0x10) sendmsg$kcm(r2, &(0x7f0000003f40)={&(0x7f0000003d00)=@hci={0x1f, r3, 0x1}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003d80)="2a68ad7e188e8938ceb0aa675d5b876d966b9f7c2f17a7773be48560a9975ff7fb9f02ebb7f2c5401a06bc415f7d7ec448455774fc105542b9a48f06d5e3ef9b26a6a64be5727cd9dbccaa7824a7914d15f52e196eeebdf511e645525892a8e63870b3de6d232baff658045c998daef10dffd7acf1c3c8391efa68bb32c157413f0b75af4df0e7605d1a71b5aa8b", 0x8e}, {&(0x7f0000003e40)="db492c7501c64a67c5b99924a67565a8852ffbd888a3c635fbb19ac961a45cc1877967b021a2867693eed1cad8bd869904e2d6bfbff319a070d3692a8ee69a810f3ed3f6672f48388fd21939fb61f4e531527979936b728da67485ac70d7ea7ca61877c0d4afff56ad4693f2d986c57fadc6a40bb1f8577bf2b876306f848debc636b57efe527dd6c83c69c25305c8ac8342e7a2b642f80203ac707725b1460be3edbaf4aaeda5bd84819c5dd8", 0xad}], 0x2, &(0x7f00000051c0)=[{0x1010, 0x139, 0x9, "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"}, {0xe0, 0x110, 0x11fcb750, "f7a974f4407b17ea5311eebd42916ffd41024d2b174f85178dbd59317e9a280b3b87c799843583615044e04a3be9a5f2661466080287c8200abc3f79b57c5e97d384436d89f58a34f60bb16fff1e626506e87712a4ab73c8794a07c5f0fb73c8234fe4139fbf68a3ac62dcdcb497abf2891b4ce9f4a8155a41845e1ee93c0012088a5bf8ba1e6bd02fc4b59b1453ff729464f358391d71a694e6a714052c1a8446dbe567ed33ceb1d89bf7146c6f27f84695e7f4336700bed271b907de7e204a6f5e1afa705cc2bb37b415520f394e"}, {0xf8, 0x10f, 0x0, "3b0487cde2ebce08e83bfe1c5d03fa3880bc1cf05376ede29019f85e1c649dbb0b44c6ac33f5e9504777593562e2666272f0fa0d032af34495edd0f3aeffd0609582a84bd063441b06db88c0722f58e068db83e165649d9429ac17fee4edd717a9313d339a68b3e153a8b4a52ec611bde564200d83553d15b44cb2812a15e808e9fb090b346ab4686d1247dc71d1f844e846c4e2e734851d8b6d47069a534f5562137fd69fab51324f6c10a3f6e4f833d38a79158b412f40ab235b44ae97364fdd37f47cd3aa22b706f97cceeb01c5d0f64ce168aaf709a4c81be3671b14eea6d9a440"}, {0xc0, 0x10d, 0x10000, "aee620035d953e87ee0eb5f5dc5413f27bff2dd82744914a635aed7e72497bd8a9073265806551d79506739216e38f77f66df5a32cafbf330d82d3592199a66d26221e7507277b957f594286af53b1608d28ee3796fc05ffb2b47aa7f7265444da2ed8aa72d38fdfd7964df6247dabd5d6e622cc166938c2778a4402f4bd9ed47e0363d30170b3e9e94ee810126816a0b76d249bd147dc7afeb109f4c7c96c7d26d7c62c8d7808766d0193"}, {0x100, 0x104, 0x1, "ed23bb4cb610a3ca68eb972f9f9dfc24c905bfb73b51f4d9c301a037ad8807d7ac5fc672ae3419e578a5a2e8bfdd5557e2da939ac9aba5f096654ccc96e6475430ce47edb767da4b0ac777ca838d3cec977361b85b4ad12d4063300d05093f5ea8471249066f13482542b7319a422c26b726af57b3269be3ef0fbe501b37919aea97b27b6d60c6e5946713ed81611254a706c9f57707c0225879dfe029fcf42772eaf39954b3e3710ee814a37afd70e40cb89bb87f21e530471f2716325f7755bf5ee8c0d24c138180a60e56a33ebc6ae025a407a33d6011213c9089472a8035669c3930c64145744b7d03295d"}, {0xd0, 0x1be, 0x2, "596e775ddc4d9173dc1c45d4fc4bdff72cfa4945518bb8e5f9ce0e87b83f034161dcd0978d7de71260eff6229fd5bf859ccd968a2de9747bbe60b643fa61ae8ce4c8e88ac2964200ad118716c18eaa34135bc92f89b5ebd35aff6d749e5a1ddade0264db97e9a5b0246ceec811389703977e1ecb9fd788be6c62b3c2df5c9294688fbe00d1d9ddb5512ff587e5b5e0b59cfca03c91f33b7a9650c8e1fa830eec92c206fc9a13791f1e8fede3cd065fffe3879232af60f9a98e3108"}], 0x1478, 0x8000}, 0x1) close(r1) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x2c) 2018/04/05 10:22:36 executing program 6 (fault-call:4 fault-nth:7): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) [ 413.586648] FAULT_INJECTION: forcing a failure. [ 413.586648] name failslab, interval 1, probability 0, space 0, times 0 [ 413.598022] CPU: 1 PID: 30229 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 413.604870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.614407] Call Trace: [ 413.617011] dump_stack+0x1b9/0x29f [ 413.620659] ? arch_local_irq_restore+0x52/0x52 [ 413.625349] should_fail.cold.4+0xa/0x1a [ 413.629430] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 413.634552] ? perf_trace_lock+0x900/0x900 [ 413.638813] ? find_held_lock+0x36/0x1c0 [ 413.642919] ? check_same_owner+0x320/0x320 [ 413.647255] ? rcu_note_context_switch+0x710/0x710 [ 413.652191] should_failslab+0x124/0x180 [ 413.656254] kmem_cache_alloc_trace+0x2cb/0x780 [ 413.660921] ? kasan_check_write+0x14/0x20 [ 413.665331] ? do_raw_spin_lock+0xc1/0x200 [ 413.669561] sget_userns+0x1c7/0xf20 [ 413.673263] ? set_anon_super+0x20/0x20 [ 413.677228] ? get_empty_filp.cold.7+0x3e/0x3e [ 413.681816] ? destroy_unused_super.part.9+0x100/0x100 [ 413.687097] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 413.692117] ? kasan_check_read+0x11/0x20 [ 413.696270] ? rcu_pm_notify+0xc0/0xc0 [ 413.700153] ? trace_hardirqs_off+0xd/0x10 [ 413.704387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.709921] ? cap_capable+0x1f9/0x260 [ 413.713810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.719747] ? security_capable+0xa4/0xd0 [ 413.723884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.729410] ? ns_capable_common+0x13f/0x170 [ 413.733828] mount_ns+0x8f/0x1d0 [ 413.737180] ? rpc_pipe_release+0xb70/0xb70 [ 413.741490] rpc_mount+0x9e/0xd0 [ 413.744844] mount_fs+0xae/0x328 [ 413.748197] vfs_kern_mount.part.34+0xd4/0x4d0 [ 413.752774] ? may_umount+0xb0/0xb0 [ 413.756387] ? _raw_read_unlock+0x22/0x30 [ 413.760529] ? __get_fs_type+0x97/0xc0 [ 413.764403] do_mount+0x564/0x3070 [ 413.767940] ? copy_mount_string+0x40/0x40 [ 413.772173] ? rcu_pm_notify+0xc0/0xc0 [ 413.776154] ? copy_mount_options+0x5f/0x380 [ 413.780571] ? rcu_read_lock_sched_held+0x108/0x120 [ 413.785573] ? kmem_cache_alloc_trace+0x616/0x780 [ 413.790497] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.796049] ? _copy_from_user+0xdf/0x150 [ 413.800196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.805727] ? copy_mount_options+0x285/0x380 [ 413.810223] ksys_mount+0x12d/0x140 [ 413.813864] SyS_mount+0x35/0x50 [ 413.817230] ? ksys_mount+0x140/0x140 [ 413.821039] do_syscall_64+0x29e/0x9d0 [ 413.824911] ? vmalloc_sync_all+0x30/0x30 [ 413.829046] ? _raw_spin_unlock_irq+0x27/0x70 [ 413.833527] ? finish_task_switch+0x1ca/0x820 [ 413.838010] ? syscall_return_slowpath+0x5c0/0x5c0 [ 413.842945] ? syscall_return_slowpath+0x30f/0x5c0 [ 413.847870] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 413.853222] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.858073] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 413.863440] RIP: 0033:0x4552d9 [ 413.866611] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 413.874308] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 413.881570] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 413.888823] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 413.896087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 413.903351] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000007 2018/04/05 10:22:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:37 executing program 2: socketpair(0x15, 0x5, 0x80002f00, &(0x7f00000001c0)) 2018/04/05 10:22:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xb000000]}, 0x2c) 2018/04/05 10:22:37 executing program 0: r0 = gettid() socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) sendmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="5742e3216d1572052c9b7e70862a23c1213874b87141f1002f98d6840fdf7a154fe0209bf448b6534502a1e4fecad6603589bc78da272de156a1e0021945b1cab270448c9e56cb2a664936f386472c6782455171bee6a1da6474a761f61f8cec3182769be451d10ad9e1f3e2709bd2a9724e9179ceae9e70fbccd56af0bd2d46fe13640923e53b7ac2a90018a2792e391bbb8284a8c8f929dec7c6afd2d55b70c74142910e4dae60dfd0d1bc19cec40a0d6595660c23958267e31f7f21e72f805e2887", 0xc3}], 0x1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0xf8, 0x4}, 0x40000) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0xd, 0x1, 0x1, 0x1, 0x8, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x6, 0xfff, 0xff, 0x0, 0xdb90bc252ce304fc, r3, 0x54}, 0x2c) close(r2) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffff9c, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000180)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r4, 0xea, 0x8}, 0xc) socketpair(0x1, 0xa, 0x3ff, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0xffffffffffffffa3) perf_event_open(&(0x7f00000003c0)={0x3, 0x5f, 0x24, 0x1f, 0x1, 0x8, 0x0, 0x10001, 0x204, 0x8, 0x100000001, 0x80000001, 0x101, 0x33, 0xcb63, 0x101, 0x5, 0x0, 0xfb9, 0x1000, 0x0, 0xffffffffffffffea, 0x1, 0x5, 0x8001, 0x40, 0x1ff, 0x1, 0x4, 0x8, 0x0, 0x4, 0xc5, 0x10000, 0x5ed, 0xff, 0x2, 0xffffffff, 0x0, 0xffffffffffff8001, 0x1, @perf_config_ext={0x1}, 0x20000, 0xeb, 0x7, 0x2, 0x4, 0x8, 0x33e}, r0, 0xd, r5, 0x2) 2018/04/05 10:22:37 executing program 6 (fault-call:4 fault-nth:8): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:37 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:37 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c65309c", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x2c) 2018/04/05 10:22:37 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x7c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) [ 414.419503] FAULT_INJECTION: forcing a failure. [ 414.419503] name failslab, interval 1, probability 0, space 0, times 0 [ 414.430825] CPU: 1 PID: 30251 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 414.437667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.447021] Call Trace: [ 414.449619] dump_stack+0x1b9/0x29f [ 414.453353] ? arch_local_irq_restore+0x52/0x52 [ 414.458043] should_fail.cold.4+0xa/0x1a [ 414.462125] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 414.467251] ? perf_trace_lock+0x900/0x900 [ 414.471507] ? find_held_lock+0x36/0x1c0 [ 414.475598] ? check_same_owner+0x320/0x320 [ 414.479929] ? rcu_note_context_switch+0x710/0x710 [ 414.484877] should_failslab+0x124/0x180 [ 414.488955] kmem_cache_alloc_trace+0x2cb/0x780 [ 414.493637] ? kasan_check_write+0x14/0x20 [ 414.497877] ? do_raw_spin_lock+0xc1/0x200 [ 414.502139] sget_userns+0x1c7/0xf20 [ 414.505863] ? set_anon_super+0x20/0x20 [ 414.509854] ? get_empty_filp.cold.7+0x3e/0x3e [ 414.514449] ? destroy_unused_super.part.9+0x100/0x100 2018/04/05 10:22:38 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x2c) 2018/04/05 10:22:38 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) [ 414.519754] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 414.524783] ? kasan_check_read+0x11/0x20 [ 414.528942] ? rcu_pm_notify+0xc0/0xc0 [ 414.533010] ? trace_hardirqs_off+0xd/0x10 [ 414.537257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.542799] ? cap_capable+0x1f9/0x260 [ 414.546703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.552252] ? security_capable+0xa4/0xd0 [ 414.556414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.561962] ? ns_capable_common+0x13f/0x170 [ 414.566388] mount_ns+0x8f/0x1d0 2018/04/05 10:22:38 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x10000000]}, 0x2c) [ 414.569768] ? rpc_pipe_release+0xb70/0xb70 [ 414.574104] rpc_mount+0x9e/0xd0 [ 414.577486] mount_fs+0xae/0x328 [ 414.580866] vfs_kern_mount.part.34+0xd4/0x4d0 [ 414.585455] ? may_umount+0xb0/0xb0 [ 414.589099] ? _raw_read_unlock+0x22/0x30 [ 414.593255] ? __get_fs_type+0x97/0xc0 [ 414.597155] do_mount+0x564/0x3070 [ 414.600701] ? do_raw_spin_unlock+0x9e/0x2e0 [ 414.605124] ? copy_mount_string+0x40/0x40 [ 414.609364] ? rcu_pm_notify+0xc0/0xc0 [ 414.613265] ? copy_mount_options+0x5f/0x380 2018/04/05 10:22:38 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) socketpair(0x17, 0x80007, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r2, &(0x7f0000000200)={&(0x7f00000000c0)=@in={0x0, 0x0, @multicast1}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)=""/20, 0x14}], 0x1, &(0x7f00000001c0), 0x0, 0x40}, 0x0) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) gettid() [ 414.617681] ? rcu_read_lock_sched_held+0x108/0x120 [ 414.622705] ? kmem_cache_alloc_trace+0x616/0x780 [ 414.627559] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 414.633107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 414.638655] ? copy_mount_options+0x285/0x380 [ 414.643158] ksys_mount+0x12d/0x140 [ 414.646784] SyS_mount+0x35/0x50 [ 414.650176] ? ksys_mount+0x140/0x140 [ 414.653984] do_syscall_64+0x29e/0x9d0 [ 414.657873] ? vmalloc_sync_all+0x30/0x30 [ 414.662028] ? _raw_spin_unlock_irq+0x27/0x70 2018/04/05 10:22:38 executing program 2: socketpair(0x15, 0x5, 0x8000003e, &(0x7f00000001c0)) [ 414.666529] ? finish_task_switch+0x1ca/0x820 [ 414.671034] ? syscall_return_slowpath+0x5c0/0x5c0 [ 414.675975] ? syscall_return_slowpath+0x30f/0x5c0 [ 414.680916] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 414.686291] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 414.691149] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 414.696338] RIP: 0033:0x4552d9 [ 414.699531] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 414.707246] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 2018/04/05 10:22:38 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x3]}, 0x2c) 2018/04/05 10:22:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 414.714518] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 414.721790] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 414.729064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 414.736336] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000008 2018/04/05 10:22:38 executing program 2: socketpair(0x15, 0x5, 0x800000aa, &(0x7f00000001c0)) 2018/04/05 10:22:38 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x7]}, 0x2c) 2018/04/05 10:22:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:39 executing program 6 (fault-call:4 fault-nth:9): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x9000000]}, 0x2c) 2018/04/05 10:22:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) socketpair$inet6(0xa, 0x7, 0x7f2, &(0x7f0000000000)) socketpair(0x1f, 0x80000, 0x7bb4, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={r0}) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000015c0)={&(0x7f0000001580)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000001600)={r1, r4}) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:39 executing program 2: socketpair(0x15, 0x5, 0x8000017d, &(0x7f00000001c0)) 2018/04/05 10:22:39 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:39 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2c) 2018/04/05 10:22:39 executing program 2: socketpair(0x15, 0x5, 0x8000d501, &(0x7f00000001c0)) 2018/04/05 10:22:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) [ 415.834519] FAULT_INJECTION: forcing a failure. [ 415.834519] name failslab, interval 1, probability 0, space 0, times 0 [ 415.846157] CPU: 1 PID: 30328 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 415.853001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.862384] Call Trace: [ 415.864986] dump_stack+0x1b9/0x29f [ 415.868633] ? arch_local_irq_restore+0x52/0x52 [ 415.873315] ? kernel_text_address+0x79/0xf0 [ 415.877731] ? __unwind_start+0x166/0x330 [ 415.881897] should_fail.cold.4+0xa/0x1a [ 415.885976] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 415.891096] ? graph_lock+0x170/0x170 [ 415.894903] ? save_stack+0x43/0xd0 [ 415.898538] ? kasan_kmalloc+0xc4/0xe0 [ 415.902434] ? __list_lru_init+0xcf/0x7b0 [ 415.906599] ? find_held_lock+0x36/0x1c0 [ 415.910679] ? __lock_is_held+0xb5/0x140 [ 415.914770] ? check_same_owner+0x320/0x320 [ 415.919127] ? rcu_note_context_switch+0x710/0x710 [ 415.924075] should_failslab+0x124/0x180 [ 415.928208] kmem_cache_alloc_node_trace+0x26f/0x770 [ 415.933319] ? mark_held_locks+0xc9/0x160 [ 415.937477] ? __raw_spin_lock_init+0x1c/0x100 [ 415.942074] __kmalloc_node+0x33/0x70 [ 415.945983] kvmalloc_node+0x6b/0x100 [ 415.949796] __list_lru_init+0x50e/0x7b0 [ 415.953870] ? list_lru_destroy+0x4c0/0x4c0 [ 415.958197] ? __raw_spin_lock_init+0x1c/0x100 [ 415.962790] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 415.967811] ? __lockdep_init_map+0x105/0x590 [ 415.972318] ? lockdep_init_map+0x9/0x10 [ 415.976393] sget_userns+0x6d9/0xf20 [ 415.980111] ? set_anon_super+0x20/0x20 2018/04/05 10:22:39 executing program 2: socketpair(0x15, 0x5, 0x8000a201, &(0x7f00000001c0)) 2018/04/05 10:22:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x2c) 2018/04/05 10:22:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 415.984097] ? get_empty_filp.cold.7+0x3e/0x3e [ 415.988685] ? destroy_unused_super.part.9+0x100/0x100 [ 415.993983] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 415.999011] ? kasan_check_read+0x11/0x20 [ 416.003185] ? rcu_pm_notify+0xc0/0xc0 [ 416.007079] ? trace_hardirqs_off+0xd/0x10 [ 416.011321] ? cap_capable+0x1f9/0x260 [ 416.015220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.020764] ? security_capable+0xa4/0xd0 [ 416.024924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.030474] ? ns_capable_common+0x13f/0x170 [ 416.034898] mount_ns+0x8f/0x1d0 [ 416.038282] ? rpc_pipe_release+0xb70/0xb70 [ 416.042611] rpc_mount+0x9e/0xd0 [ 416.045988] mount_fs+0xae/0x328 [ 416.049363] vfs_kern_mount.part.34+0xd4/0x4d0 [ 416.053953] ? may_umount+0xb0/0xb0 [ 416.057586] ? _raw_read_unlock+0x22/0x30 [ 416.061737] ? __get_fs_type+0x97/0xc0 [ 416.065644] do_mount+0x564/0x3070 [ 416.069196] ? copy_mount_string+0x40/0x40 [ 416.073476] ? rcu_pm_notify+0xc0/0xc0 [ 416.077467] ? copy_mount_options+0x5f/0x380 [ 416.082000] ? rcu_read_lock_sched_held+0x108/0x120 [ 416.087021] ? kmem_cache_alloc_trace+0x616/0x780 [ 416.091880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 416.097425] ? copy_mount_options+0x285/0x380 [ 416.101934] ksys_mount+0x12d/0x140 [ 416.105569] SyS_mount+0x35/0x50 [ 416.108945] ? ksys_mount+0x140/0x140 [ 416.112755] do_syscall_64+0x29e/0x9d0 [ 416.116669] ? vmalloc_sync_all+0x30/0x30 [ 416.120828] ? _raw_spin_unlock_irq+0x27/0x70 [ 416.125333] ? finish_task_switch+0x1ca/0x820 [ 416.129835] ? syscall_return_slowpath+0x5c0/0x5c0 2018/04/05 10:22:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 416.134772] ? syscall_return_slowpath+0x30f/0x5c0 [ 416.139715] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 416.145094] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 416.149964] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 416.155154] RIP: 0033:0x4552d9 [ 416.158343] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 416.166063] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 416.173509] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 416.180782] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 416.188053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 416.195326] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000009 2018/04/05 10:22:40 executing program 6 (fault-call:4 fault-nth:10): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000200)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000340)={r0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:40 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:40 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:40 executing program 2: socketpair(0x15, 0x5, 0x8000bd01, &(0x7f00000001c0)) 2018/04/05 10:22:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x2c) [ 416.904846] FAULT_INJECTION: forcing a failure. [ 416.904846] name failslab, interval 1, probability 0, space 0, times 0 [ 416.916208] CPU: 0 PID: 30380 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 416.923052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.932410] Call Trace: [ 416.935014] dump_stack+0x1b9/0x29f [ 416.938660] ? arch_local_irq_restore+0x52/0x52 [ 416.943349] ? perf_trace_lock+0x900/0x900 [ 416.947696] should_fail.cold.4+0xa/0x1a [ 416.951772] ? graph_lock+0x170/0x170 [ 416.955592] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 416.960708] ? lock_downgrade+0x8e0/0x8e0 [ 416.964869] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 416.970425] ? find_next_zero_bit+0x111/0x140 [ 416.974939] ? graph_lock+0x170/0x170 [ 416.978760] ? find_held_lock+0x36/0x1c0 [ 416.982838] ? __lock_is_held+0xb5/0x140 [ 416.986926] ? check_same_owner+0x320/0x320 [ 416.991258] ? __might_sleep+0x95/0x190 [ 416.995247] ? rcu_note_context_switch+0x710/0x710 [ 417.000199] should_failslab+0x124/0x180 [ 417.004275] __kmalloc+0x2c8/0x760 [ 417.007838] ? lockdep_init_map+0x9/0x10 [ 417.011908] ? debug_mutex_init+0x2d/0x60 [ 417.016069] ? __list_lru_init+0xcf/0x7b0 [ 417.020238] __list_lru_init+0xcf/0x7b0 [ 417.024232] ? list_lru_destroy+0x4c0/0x4c0 [ 417.028565] ? __raw_spin_lock_init+0x1c/0x100 [ 417.033170] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 417.038207] ? __lockdep_init_map+0x105/0x590 [ 417.042713] ? lockdep_init_map+0x9/0x10 [ 417.046789] sget_userns+0x6d9/0xf20 [ 417.050509] ? set_anon_super+0x20/0x20 [ 417.054503] ? get_empty_filp.cold.7+0x3e/0x3e [ 417.059102] ? destroy_unused_super.part.9+0x100/0x100 [ 417.064404] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 417.069444] ? kasan_check_read+0x11/0x20 [ 417.073620] ? rcu_pm_notify+0xc0/0xc0 [ 417.077521] ? trace_hardirqs_off+0xd/0x10 [ 417.081770] ? cap_capable+0x1f9/0x260 [ 417.085677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.091229] ? security_capable+0xa4/0xd0 [ 417.095396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.100945] ? ns_capable_common+0x13f/0x170 [ 417.105370] mount_ns+0x8f/0x1d0 [ 417.108743] ? rpc_pipe_release+0xb70/0xb70 [ 417.113073] rpc_mount+0x9e/0xd0 [ 417.116452] mount_fs+0xae/0x328 [ 417.119836] vfs_kern_mount.part.34+0xd4/0x4d0 [ 417.124429] ? may_umount+0xb0/0xb0 [ 417.128071] ? _raw_read_unlock+0x22/0x30 [ 417.132235] ? __get_fs_type+0x97/0xc0 [ 417.136142] do_mount+0x564/0x3070 [ 417.139689] ? do_raw_spin_unlock+0x9e/0x2e0 [ 417.144121] ? copy_mount_string+0x40/0x40 [ 417.148377] ? rcu_pm_notify+0xc0/0xc0 [ 417.152289] ? copy_mount_options+0x5f/0x380 [ 417.156710] ? rcu_read_lock_sched_held+0x108/0x120 [ 417.161740] ? kmem_cache_alloc_trace+0x616/0x780 [ 417.166596] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 417.172148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 417.177695] ? copy_mount_options+0x285/0x380 [ 417.182200] ksys_mount+0x12d/0x140 [ 417.185836] SyS_mount+0x35/0x50 [ 417.189214] ? ksys_mount+0x140/0x140 [ 417.193029] do_syscall_64+0x29e/0x9d0 [ 417.196920] ? vmalloc_sync_all+0x30/0x30 [ 417.201079] ? _raw_spin_unlock_irq+0x27/0x70 [ 417.205581] ? finish_task_switch+0x1ca/0x820 [ 417.210082] ? syscall_return_slowpath+0x5c0/0x5c0 [ 417.215025] ? syscall_return_slowpath+0x30f/0x5c0 [ 417.219970] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 417.225352] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 417.230208] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 417.235400] RIP: 0033:0x4552d9 [ 417.238586] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 417.246300] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 2018/04/05 10:22:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x2c) 2018/04/05 10:22:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:40 executing program 2: socketpair(0x15, 0x5, 0x800001e4, &(0x7f00000001c0)) 2018/04/05 10:22:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair(0xf, 0x6, 0x61, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000200)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r2, &(0x7f00000000c0)="dd81ee44e02ac1b537ee56dacd2447b270864b7d8870c8082c1c9604e435af33c2657c188170feeff8b3a19bb43fe34c2c0a89aca1d0bef6a25bd3fc7b609c380ad3d408549f5e5484929f08875b4097268789488fff563ba3cd5bd1cdf7a407eff0e319d9012e3e262e3c2b07f90dcab9b6f8907941bda1b1eb0be9286c4c684e27009897be411327576dd8795ae86a5189f27130db9d65eda332bad0a89286eb15b31abfe9fcf2470f52155af44bc7bbb557acae726f76cf92d6a1c91a6c389688fabb3f0a6ac6e8351b0c1f97e0864cc67f43191b92a1dbabfe0c"}, 0x10) 2018/04/05 10:22:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, 0x2c) 2018/04/05 10:22:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000640)={&(0x7f0000000140)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000580)=[{&(0x7f00000001c0)=""/25, 0x19}, {&(0x7f0000000200)=""/29, 0x1d}, {&(0x7f0000000ec0)=""/4096, 0x1000}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/195, 0xc3}, {&(0x7f0000000380)=""/131, 0x83}, {&(0x7f0000000440)=""/37, 0x25}, {&(0x7f0000000480)=""/203, 0xcb}], 0x8, &(0x7f0000000600)=""/5, 0x5, 0x3}, 0x2000) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000bc0)={r0}) recvmsg$kcm(r2, &(0x7f0000000e80)={&(0x7f0000000c00)=@pptp={0x0, 0x0, {0x0, @local}}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000c80)=""/177, 0xb1}], 0x1, &(0x7f0000000d80)=""/197, 0xc5, 0x3}, 0x101) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) r4 = getpid() socketpair(0xf, 0x0, 0x6, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000680)={0x7, 0x70, 0x5, 0x7, 0x9, 0x3f, 0x0, 0xc000000, 0x0, 0x1, 0x2, 0x8, 0x1, 0x4, 0x100000000, 0xc080, 0x9, 0x0, 0x1, 0x200, 0x82, 0x7, 0xffff, 0x1, 0x6, 0x2, 0x0, 0x0, 0x4, 0x6, 0x80, 0x1, 0x1a2, 0x5, 0x9, 0x9, 0x400, 0x3f5, 0x0, 0x1000, 0x1, @perf_config_ext={0x0, 0x3}, 0x400, 0x2, 0x8, 0x3, 0xffffffff, 0x1, 0x3}, r4, 0x3, r5, 0xa) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r3, 0xfffffffffffff800, 0x18}, 0xc) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) [ 417.253594] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 417.260869] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 417.268178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 417.275459] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000000a 2018/04/05 10:22:41 executing program 6 (fault-call:4 fault-nth:11): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:41 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:41 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:41 executing program 2: socketpair(0x15, 0x5, 0x80003801, &(0x7f00000001c0)) 2018/04/05 10:22:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, 0x2c) 2018/04/05 10:22:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 418.039692] FAULT_INJECTION: forcing a failure. [ 418.039692] name failslab, interval 1, probability 0, space 0, times 0 [ 418.050984] CPU: 1 PID: 30424 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 418.057829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.067187] Call Trace: [ 418.069802] dump_stack+0x1b9/0x29f [ 418.073444] ? arch_local_irq_restore+0x52/0x52 [ 418.078125] ? __save_stack_trace+0x7e/0xd0 [ 418.082897] should_fail.cold.4+0xa/0x1a [ 418.086969] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 418.092087] ? kasan_kmalloc+0xc4/0xe0 [ 418.095983] ? kmem_cache_alloc_trace+0x152/0x780 [ 418.100834] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 418.106028] ? __list_lru_init+0x45e/0x7b0 [ 418.110271] ? sget_userns+0x6d9/0xf20 [ 418.114164] ? mount_ns+0x8f/0x1d0 [ 418.117710] ? graph_lock+0x170/0x170 [ 418.121519] ? do_mount+0x564/0x3070 [ 418.125238] ? ksys_mount+0x12d/0x140 [ 418.129048] ? SyS_mount+0x35/0x50 [ 418.132598] ? do_syscall_64+0x29e/0x9d0 [ 418.136672] ? find_held_lock+0x36/0x1c0 [ 418.140758] ? __lock_is_held+0xb5/0x140 [ 418.144843] ? check_same_owner+0x320/0x320 [ 418.149178] ? rcu_note_context_switch+0x710/0x710 [ 418.154122] should_failslab+0x124/0x180 [ 418.158193] kmem_cache_alloc_trace+0x2cb/0x780 [ 418.163131] ? __kmalloc_node+0x33/0x70 [ 418.167114] ? __kmalloc_node+0x33/0x70 [ 418.171097] ? rcu_read_lock_sched_held+0x108/0x120 [ 418.176129] __memcg_init_list_lru_node+0x17c/0x2c0 [ 418.181156] ? list_lru_add+0x850/0x850 [ 418.185141] ? __kmalloc_node+0x47/0x70 2018/04/05 10:22:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:41 executing program 2: socketpair(0x15, 0x5, 0x8000d901, &(0x7f00000001c0)) 2018/04/05 10:22:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x2c) 2018/04/05 10:22:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0x2c) 2018/04/05 10:22:41 executing program 2: socketpair(0x15, 0x5, 0x8000002f, &(0x7f00000001c0)) [ 418.189132] __list_lru_init+0x45e/0x7b0 [ 418.193205] ? list_lru_destroy+0x4c0/0x4c0 [ 418.197531] ? __raw_spin_lock_init+0x1c/0x100 [ 418.202121] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 418.207140] ? __lockdep_init_map+0x105/0x590 [ 418.211823] ? lockdep_init_map+0x9/0x10 [ 418.215893] sget_userns+0x6d9/0xf20 [ 418.219609] ? set_anon_super+0x20/0x20 [ 418.223590] ? get_empty_filp.cold.7+0x3e/0x3e [ 418.228180] ? destroy_unused_super.part.9+0x100/0x100 [ 418.233471] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 2018/04/05 10:22:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 418.238847] ? kasan_check_read+0x11/0x20 [ 418.243005] ? rcu_pm_notify+0xc0/0xc0 [ 418.246897] ? trace_hardirqs_off+0xd/0x10 [ 418.251137] ? cap_capable+0x1f9/0x260 [ 418.255038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.260582] ? security_capable+0xa4/0xd0 [ 418.264771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.270323] ? ns_capable_common+0x13f/0x170 [ 418.274748] mount_ns+0x8f/0x1d0 [ 418.278145] ? rpc_pipe_release+0xb70/0xb70 [ 418.282479] rpc_mount+0x9e/0xd0 [ 418.285869] mount_fs+0xae/0x328 [ 418.289251] vfs_kern_mount.part.34+0xd4/0x4d0 [ 418.293843] ? may_umount+0xb0/0xb0 [ 418.297480] ? _raw_read_unlock+0x22/0x30 [ 418.301720] ? __get_fs_type+0x97/0xc0 [ 418.305626] do_mount+0x564/0x3070 [ 418.309178] ? copy_mount_string+0x40/0x40 [ 418.313418] ? rcu_pm_notify+0xc0/0xc0 [ 418.317408] ? copy_mount_options+0x5f/0x380 [ 418.321833] ? rcu_read_lock_sched_held+0x108/0x120 [ 418.326857] ? kmem_cache_alloc_trace+0x616/0x780 [ 418.331719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/04/05 10:22:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x2c) 2018/04/05 10:22:41 executing program 2: socketpair(0x15, 0x5, 0x8000d801, &(0x7f00000001c0)) [ 418.337268] ? copy_mount_options+0x285/0x380 [ 418.341805] ksys_mount+0x12d/0x140 [ 418.345440] SyS_mount+0x35/0x50 [ 418.348814] ? ksys_mount+0x140/0x140 [ 418.352893] do_syscall_64+0x29e/0x9d0 [ 418.356847] ? vmalloc_sync_all+0x30/0x30 [ 418.361089] ? _raw_spin_unlock_irq+0x27/0x70 [ 418.365593] ? finish_task_switch+0x1ca/0x820 [ 418.370104] ? syscall_return_slowpath+0x5c0/0x5c0 [ 418.375043] ? syscall_return_slowpath+0x30f/0x5c0 [ 418.379993] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 418.385980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 418.390846] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 418.396041] RIP: 0033:0x4552d9 [ 418.399232] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 418.406954] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 418.414236] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 418.421595] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 418.428870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 418.436146] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000000b 2018/04/05 10:22:42 executing program 6 (fault-call:4 fault-nth:12): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:42 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:42 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530b6", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x2c) 2018/04/05 10:22:42 executing program 2: socketpair(0x15, 0x5, 0x80005501, &(0x7f00000001c0)) 2018/04/05 10:22:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) socketpair(0xe, 0x1, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000000c0)={0x2, 0x0, [0x0, 0x0]}) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) [ 419.130802] FAULT_INJECTION: forcing a failure. [ 419.130802] name failslab, interval 1, probability 0, space 0, times 0 [ 419.142138] CPU: 1 PID: 30472 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 419.148983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.158337] Call Trace: [ 419.160939] dump_stack+0x1b9/0x29f [ 419.164577] ? arch_local_irq_restore+0x52/0x52 [ 419.169257] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 419.174464] should_fail.cold.4+0xa/0x1a 2018/04/05 10:22:42 executing program 2: socketpair(0x15, 0x5, 0x80000114, &(0x7f00000001c0)) 2018/04/05 10:22:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 419.178539] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 419.183663] ? unwind_get_return_address+0x61/0xa0 [ 419.188603] ? __save_stack_trace+0x7e/0xd0 [ 419.192938] ? graph_lock+0x170/0x170 [ 419.196759] ? find_held_lock+0x36/0x1c0 [ 419.200837] ? __lock_is_held+0xb5/0x140 [ 419.204919] ? check_same_owner+0x320/0x320 [ 419.209258] ? rcu_note_context_switch+0x710/0x710 [ 419.214208] should_failslab+0x124/0x180 [ 419.218288] kmem_cache_alloc_trace+0x2cb/0x780 [ 419.222967] ? __kmalloc_node+0x33/0x70 [ 419.226953] ? __kmalloc_node+0x33/0x70 2018/04/05 10:22:42 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x2c) [ 419.230942] ? rcu_read_lock_sched_held+0x108/0x120 [ 419.235972] __memcg_init_list_lru_node+0x17c/0x2c0 [ 419.241004] ? list_lru_add+0x850/0x850 [ 419.244992] ? __kmalloc_node+0x47/0x70 [ 419.248990] __list_lru_init+0x45e/0x7b0 [ 419.253063] ? list_lru_destroy+0x4c0/0x4c0 [ 419.257395] ? __raw_spin_lock_init+0x1c/0x100 [ 419.261995] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 419.267031] ? __lockdep_init_map+0x105/0x590 [ 419.271547] ? lockdep_init_map+0x9/0x10 [ 419.275628] sget_userns+0x6d9/0xf20 2018/04/05 10:22:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 419.279358] ? set_anon_super+0x20/0x20 [ 419.283346] ? get_empty_filp.cold.7+0x3e/0x3e [ 419.287940] ? destroy_unused_super.part.9+0x100/0x100 [ 419.293242] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 419.298281] ? kasan_check_read+0x11/0x20 [ 419.302445] ? rcu_pm_notify+0xc0/0xc0 [ 419.306345] ? trace_hardirqs_off+0xd/0x10 [ 419.310594] ? cap_capable+0x1f9/0x260 [ 419.314500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.320052] ? security_capable+0xa4/0xd0 [ 419.324216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/04/05 10:22:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 419.329852] ? ns_capable_common+0x13f/0x170 [ 419.334277] mount_ns+0x8f/0x1d0 [ 419.337659] ? rpc_pipe_release+0xb70/0xb70 [ 419.341989] rpc_mount+0x9e/0xd0 [ 419.345366] mount_fs+0xae/0x328 [ 419.348753] vfs_kern_mount.part.34+0xd4/0x4d0 [ 419.353343] ? may_umount+0xb0/0xb0 [ 419.356983] ? _raw_read_unlock+0x22/0x30 [ 419.361133] ? __get_fs_type+0x97/0xc0 [ 419.365035] do_mount+0x564/0x3070 [ 419.368580] ? do_raw_spin_unlock+0x9e/0x2e0 [ 419.373004] ? copy_mount_string+0x40/0x40 [ 419.377248] ? rcu_pm_notify+0xc0/0xc0 2018/04/05 10:22:42 executing program 0: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair(0x11, 0x4, 0x1ff, &(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r2, &(0x7f0000002980)={&(0x7f00000016c0)=@l2, 0x80, &(0x7f0000002840)=[{&(0x7f0000001740)=""/207, 0xcf}, {&(0x7f0000001840)=""/4096, 0x1000}], 0x2, &(0x7f0000002880)=""/214, 0xd6, 0x6}, 0x20) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) recvmsg$kcm(r3, &(0x7f0000000540)={&(0x7f00000000c0)=@ax25, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)}, {&(0x7f0000000180)=""/109, 0x6d}, {&(0x7f0000000200)=""/212, 0xd4}, {&(0x7f0000000300)=""/115, 0x73}, {&(0x7f0000000380)=""/4, 0x4}, {&(0x7f00000003c0)=""/28, 0x1c}], 0x6, &(0x7f0000000480)=""/147, 0x93}, 0x3adcb8a6540816d7) [ 419.381151] ? copy_mount_options+0x5f/0x380 [ 419.385572] ? rcu_read_lock_sched_held+0x108/0x120 [ 419.390772] ? kmem_cache_alloc_trace+0x616/0x780 [ 419.395635] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 419.401193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.406741] ? copy_mount_options+0x285/0x380 [ 419.411261] ksys_mount+0x12d/0x140 [ 419.414899] SyS_mount+0x35/0x50 [ 419.418268] ? ksys_mount+0x140/0x140 [ 419.422083] do_syscall_64+0x29e/0x9d0 [ 419.425977] ? vmalloc_sync_all+0x30/0x30 2018/04/05 10:22:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 419.430135] ? _raw_spin_unlock_irq+0x27/0x70 [ 419.434642] ? finish_task_switch+0x1ca/0x820 [ 419.439147] ? syscall_return_slowpath+0x5c0/0x5c0 [ 419.444078] ? syscall_return_slowpath+0x30f/0x5c0 [ 419.449019] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 419.454429] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.459313] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 419.464501] RIP: 0033:0x4552d9 [ 419.467692] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/04/05 10:22:43 executing program 2: socketpair(0x15, 0x5, 0x80000195, &(0x7f00000001c0)) [ 419.475580] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 419.482866] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 419.490231] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 419.497513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 419.504797] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000000c 2018/04/05 10:22:43 executing program 6 (fault-call:4 fault-nth:13): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:43 executing program 2: socketpair(0x15, 0x5, 0x8000b001, &(0x7f00000001c0)) 2018/04/05 10:22:43 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:43 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:43 executing program 0: mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hpfs\x00', 0x4, &(0x7f0000000280)="3725786c764051bd9fb85eadd634572b3ff1f38dd8a790a28c13f412b03773dac23a866c5323f7505603a6720f07fc5ffa80bab29ed2c890677422c73e698d7366a1037af2a1c257c1b0eb84927e3d75848d1864763eb44515091c23dc5453fd2ed9db4c529dbd228562e7798c846e5aca5aeb288dec5acb91d8977a7ac9f3431ee6cbab8d2b0096c389cec90ec6b8eb94faab8e2cd1148e25531d7abc92301b810d1591d50c7b4fc4e6cf79ec016c455126929b300215d3983de1118f48eaa37eec71f3ec80fed47d9701a84a5b53dc6eb8face835d6ffefb31146c32fde18ac47379bb") mkdir(&(0x7f0000000200)='./file0\x00', 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) mkdir(&(0x7f00000001c0)='./file0\x00', 0xd4) recvmsg(r0, &(0x7f0000005180)={&(0x7f00000000c0)=@can, 0x80, &(0x7f0000000800), 0x0, &(0x7f0000000140)=""/93, 0x5d, 0x3}, 0x10000) 2018/04/05 10:22:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x2c) [ 420.407754] FAULT_INJECTION: forcing a failure. [ 420.407754] name failslab, interval 1, probability 0, space 0, times 0 [ 420.419075] CPU: 0 PID: 30527 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 420.425919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.435273] Call Trace: [ 420.437877] dump_stack+0x1b9/0x29f [ 420.441528] ? arch_local_irq_restore+0x52/0x52 [ 420.446560] ? __save_stack_trace+0x7e/0xd0 [ 420.450901] should_fail.cold.4+0xa/0x1a [ 420.454981] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 420.460094] ? kasan_kmalloc+0xc4/0xe0 [ 420.463990] ? kmem_cache_alloc_trace+0x152/0x780 [ 420.468842] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 420.474041] ? __list_lru_init+0x45e/0x7b0 [ 420.478289] ? sget_userns+0x6d9/0xf20 [ 420.482215] ? mount_ns+0x8f/0x1d0 [ 420.485768] ? graph_lock+0x170/0x170 [ 420.489575] ? do_mount+0x564/0x3070 [ 420.493298] ? ksys_mount+0x12d/0x140 [ 420.497113] ? SyS_mount+0x35/0x50 [ 420.500659] ? do_syscall_64+0x29e/0x9d0 [ 420.504734] ? find_held_lock+0x36/0x1c0 [ 420.508804] ? __lock_is_held+0xb5/0x140 [ 420.512887] ? check_same_owner+0x320/0x320 [ 420.517215] ? rcu_note_context_switch+0x710/0x710 [ 420.522163] should_failslab+0x124/0x180 [ 420.526243] kmem_cache_alloc_trace+0x2cb/0x780 [ 420.530919] ? __kmalloc_node+0x33/0x70 [ 420.534899] ? __kmalloc_node+0x33/0x70 [ 420.538884] ? rcu_read_lock_sched_held+0x108/0x120 [ 420.543920] __memcg_init_list_lru_node+0x17c/0x2c0 [ 420.548948] ? list_lru_add+0x850/0x850 [ 420.552936] ? __kmalloc_node+0x47/0x70 [ 420.556930] __list_lru_init+0x45e/0x7b0 [ 420.561007] ? list_lru_destroy+0x4c0/0x4c0 [ 420.565344] ? __raw_spin_lock_init+0x1c/0x100 [ 420.569956] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 420.574981] ? __lockdep_init_map+0x105/0x590 [ 420.579486] ? lockdep_init_map+0x9/0x10 [ 420.583557] sget_userns+0x6d9/0xf20 [ 420.587274] ? set_anon_super+0x20/0x20 [ 420.591257] ? get_empty_filp.cold.7+0x3e/0x3e [ 420.595848] ? destroy_unused_super.part.9+0x100/0x100 [ 420.601401] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 420.606428] ? kasan_check_read+0x11/0x20 [ 420.610580] ? rcu_pm_notify+0xc0/0xc0 [ 420.614473] ? trace_hardirqs_off+0xd/0x10 [ 420.618712] ? cap_capable+0x1f9/0x260 [ 420.622611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.628151] ? security_capable+0xa4/0xd0 [ 420.632303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.637847] ? ns_capable_common+0x13f/0x170 [ 420.642264] mount_ns+0x8f/0x1d0 [ 420.645631] ? rpc_pipe_release+0xb70/0xb70 [ 420.649962] rpc_mount+0x9e/0xd0 [ 420.653349] mount_fs+0xae/0x328 [ 420.656723] vfs_kern_mount.part.34+0xd4/0x4d0 [ 420.661310] ? may_umount+0xb0/0xb0 [ 420.664946] ? _raw_read_unlock+0x22/0x30 [ 420.669101] ? __get_fs_type+0x97/0xc0 [ 420.672999] do_mount+0x564/0x3070 [ 420.676553] ? copy_mount_string+0x40/0x40 [ 420.680797] ? rcu_pm_notify+0xc0/0xc0 [ 420.684701] ? copy_mount_options+0x5f/0x380 [ 420.689119] ? rcu_read_lock_sched_held+0x108/0x120 [ 420.694142] ? kmem_cache_alloc_trace+0x616/0x780 [ 420.698997] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 420.704545] ? _copy_from_user+0xdf/0x150 [ 420.708707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.714256] ? copy_mount_options+0x285/0x380 [ 420.718764] ksys_mount+0x12d/0x140 [ 420.722403] SyS_mount+0x35/0x50 [ 420.725771] ? ksys_mount+0x140/0x140 [ 420.729595] do_syscall_64+0x29e/0x9d0 [ 420.733485] ? vmalloc_sync_all+0x30/0x30 [ 420.737642] ? _raw_spin_unlock_irq+0x27/0x70 [ 420.742142] ? finish_task_switch+0x1ca/0x820 [ 420.746648] ? syscall_return_slowpath+0x5c0/0x5c0 [ 420.751593] ? syscall_return_slowpath+0x30f/0x5c0 [ 420.756536] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 420.761916] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 420.766774] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 420.771975] RIP: 0033:0x4552d9 [ 420.775165] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 420.783057] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 420.790333] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 420.797606] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/04/05 10:22:44 executing program 2: socketpair(0x15, 0x5, 0x80000016, &(0x7f00000001c0)) 2018/04/05 10:22:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x2c) 2018/04/05 10:22:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x2c) 2018/04/05 10:22:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x2c) [ 420.804879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 420.812166] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000000d 2018/04/05 10:22:44 executing program 6 (fault-call:4 fault-nth:14): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:44 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:44 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:44 executing program 2: socketpair(0x15, 0x5, 0x80005f01, &(0x7f00000001c0)) 2018/04/05 10:22:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) r2 = gettid() socketpair(0x10, 0x80001, 0x2, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2, 0x9, 0xff, 0x1, 0x0, 0x1, 0x80008, 0x4, 0x2add, 0x5, 0x8, 0x0, 0x9, 0x4, 0xffffffffffffffff, 0x400000, 0x4, 0x5, 0xfcc0, 0x10000, 0x1, 0x9da, 0x5, 0x2, 0x1, 0xfe00000000000000, 0x5, 0xd16, 0x0, 0x0, 0x3f, 0x7f, 0x101, 0x4, 0x9, 0x1f, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x300c0, 0x9, 0x7f, 0x7, 0x3, 0x1275, 0x7}, r2, 0x8, r3, 0x0) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) close(r1) 2018/04/05 10:22:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x2c) [ 421.516305] FAULT_INJECTION: forcing a failure. [ 421.516305] name failslab, interval 1, probability 0, space 0, times 0 [ 421.527644] CPU: 0 PID: 30578 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 421.535185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.544542] Call Trace: [ 421.547146] dump_stack+0x1b9/0x29f [ 421.550790] ? arch_local_irq_restore+0x52/0x52 [ 421.555475] ? __save_stack_trace+0x7e/0xd0 [ 421.559819] should_fail.cold.4+0xa/0x1a [ 421.563896] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 421.569009] ? kasan_kmalloc+0xc4/0xe0 [ 421.572906] ? kmem_cache_alloc_trace+0x152/0x780 [ 421.577760] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 421.582965] ? __list_lru_init+0x45e/0x7b0 [ 421.587208] ? sget_userns+0x6d9/0xf20 [ 421.591105] ? mount_ns+0x8f/0x1d0 [ 421.594653] ? graph_lock+0x170/0x170 [ 421.598460] ? do_mount+0x564/0x3070 [ 421.602184] ? ksys_mount+0x12d/0x140 [ 421.605994] ? SyS_mount+0x35/0x50 [ 421.609549] ? do_syscall_64+0x29e/0x9d0 [ 421.613626] ? find_held_lock+0x36/0x1c0 [ 421.617706] ? __lock_is_held+0xb5/0x140 [ 421.621790] ? check_same_owner+0x320/0x320 [ 421.626122] ? rcu_note_context_switch+0x710/0x710 [ 421.631061] should_failslab+0x124/0x180 [ 421.635134] kmem_cache_alloc_trace+0x2cb/0x780 [ 421.639812] ? __kmalloc_node+0x33/0x70 [ 421.643795] ? __kmalloc_node+0x33/0x70 [ 421.647782] ? rcu_read_lock_sched_held+0x108/0x120 [ 421.652813] __memcg_init_list_lru_node+0x17c/0x2c0 [ 421.657846] ? list_lru_add+0x850/0x850 [ 421.661844] ? __kmalloc_node+0x47/0x70 [ 421.665837] __list_lru_init+0x45e/0x7b0 [ 421.669914] ? list_lru_destroy+0x4c0/0x4c0 [ 421.674252] ? __raw_spin_lock_init+0x1c/0x100 [ 421.678847] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 421.683869] ? __lockdep_init_map+0x105/0x590 [ 421.688374] ? lockdep_init_map+0x9/0x10 [ 421.692443] sget_userns+0x6d9/0xf20 [ 421.696161] ? set_anon_super+0x20/0x20 [ 421.700147] ? get_empty_filp.cold.7+0x3e/0x3e [ 421.704742] ? destroy_unused_super.part.9+0x100/0x100 [ 421.710029] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 421.715054] ? kasan_check_read+0x11/0x20 [ 421.719210] ? rcu_pm_notify+0xc0/0xc0 [ 421.723105] ? trace_hardirqs_off+0xd/0x10 [ 421.727350] ? cap_capable+0x1f9/0x260 [ 421.731251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.736795] ? security_capable+0xa4/0xd0 [ 421.740963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.746508] ? ns_capable_common+0x13f/0x170 [ 421.751537] mount_ns+0x8f/0x1d0 [ 421.754909] ? rpc_pipe_release+0xb70/0xb70 [ 421.759244] rpc_mount+0x9e/0xd0 [ 421.762617] mount_fs+0xae/0x328 [ 421.765994] vfs_kern_mount.part.34+0xd4/0x4d0 [ 421.770585] ? may_umount+0xb0/0xb0 [ 421.774217] ? _raw_read_unlock+0x22/0x30 [ 421.778367] ? __get_fs_type+0x97/0xc0 [ 421.782263] do_mount+0x564/0x3070 [ 421.785810] ? interrupt_entry+0xa1/0xe0 [ 421.789877] ? copy_mount_string+0x40/0x40 [ 421.794116] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 421.798887] ? retint_kernel+0x10/0x10 [ 421.802790] ? copy_mount_options+0x1e3/0x380 [ 421.807296] ? audit_kill_trees+0x440/0x440 [ 421.811627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.817173] ? copy_mount_options+0x285/0x380 [ 421.821680] ksys_mount+0x12d/0x140 [ 421.825315] SyS_mount+0x35/0x50 [ 421.828727] ? ksys_mount+0x140/0x140 [ 421.832539] do_syscall_64+0x29e/0x9d0 [ 421.836428] ? vmalloc_sync_all+0x30/0x30 [ 421.840582] ? _raw_spin_unlock_irq+0x27/0x70 [ 421.845083] ? finish_task_switch+0x1ca/0x820 [ 421.849587] ? syscall_return_slowpath+0x5c0/0x5c0 [ 421.854524] ? syscall_return_slowpath+0x30f/0x5c0 [ 421.859469] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 421.864847] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 421.869707] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 421.874898] RIP: 0033:0x4552d9 [ 421.878113] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 421.885832] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 421.893104] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 421.900369] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 421.907636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/05 10:22:45 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x2c) 2018/04/05 10:22:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) socketpair$inet6(0xa, 0x5, 0x1, &(0x7f0000000000)) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x4c6, 0x49e0, 0x5, 0x0, 0x6, 0x61000, 0x4, 0x8, 0xe5b, 0x9, 0x237e, 0x8a, 0xd95, 0x4, 0x7, 0x4, 0x0, 0x800, 0x291656d3, 0x1, 0xb9, 0x2, 0xf0, 0x80000001, 0x80, 0xfffffffffffff801, 0x1, 0x7ff, 0xffffffffffffffff, 0x5, 0x2e19, 0x3, 0xfffffffffffffeff, 0xfffffffffffffffd, 0x6, 0x0, 0x4, 0x3, @perf_config_ext={0x2, 0x5}, 0xc00, 0x8, 0x5, 0x5, 0x83, 0x7, 0xc8}, 0x0, 0xb, 0xffffffffffffff9c, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000180)=0x9) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f00000000c0)) 2018/04/05 10:22:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:45 executing program 2: socketpair(0x15, 0x5, 0x8000013a, &(0x7f00000001c0)) 2018/04/05 10:22:45 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x2c) 2018/04/05 10:22:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:45 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x2c) [ 421.914907] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000000e 2018/04/05 10:22:46 executing program 6 (fault-call:4 fault-nth:15): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:46 executing program 0: close(0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r0, &(0x7f0000000780)="b66fa3bd451e15ea0ad2489c0a94470d217e3fdfd361ac46f1fd93d599b1ac64c064377bd3e35ba63380ffdfd838e8a928ea5569a3d885f24094dbe3a92851c0bcf1c06fb65ca8326697d0e9eabc5912594fe87dd92be2d1da6624052899d297e3cc0af0d16f865a8bed97b40c6194aea3a779e136d8bf5c1c7a", &(0x7f0000000800)=""/232}, 0x18) r1 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r1, &(0x7f0000001c80)={&(0x7f0000001a40)=@nl, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001ac0)=""/245, 0xf5}, {&(0x7f0000001bc0)=""/75, 0x4b}], 0x2, 0x0, 0x0, 0x101}, 0x40002000) recvmsg(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000000c0)=@in6={0x0, 0x0, 0x0, @mcast1}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/212, 0xd4}, {&(0x7f0000000280)=""/166, 0xa6}, {&(0x7f0000000340)=""/119, 0x77}, {&(0x7f00000003c0)=""/243, 0xf3}, {&(0x7f00000004c0)=""/211, 0xd3}], 0x5, &(0x7f0000000000)=""/5, 0x5, 0x3}, 0x20) socketpair$ax25(0x3, 0x3, 0xce, &(0x7f0000000900)) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000006c0)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000740)) 2018/04/05 10:22:46 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:46 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:46 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x2c) 2018/04/05 10:22:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:46 executing program 2: socketpair(0x15, 0x5, 0x80007801, &(0x7f00000001c0)) 2018/04/05 10:22:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 422.747713] FAULT_INJECTION: forcing a failure. [ 422.747713] name failslab, interval 1, probability 0, space 0, times 0 [ 422.759128] CPU: 1 PID: 30647 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 422.765974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.775324] Call Trace: [ 422.777926] dump_stack+0x1b9/0x29f [ 422.781560] ? arch_local_irq_restore+0x52/0x52 [ 422.786237] ? __save_stack_trace+0x7e/0xd0 [ 422.790574] should_fail.cold.4+0xa/0x1a [ 422.794647] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 422.799761] ? kasan_kmalloc+0xc4/0xe0 [ 422.803660] ? kmem_cache_alloc_trace+0x152/0x780 [ 422.808509] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 422.813705] ? __list_lru_init+0x45e/0x7b0 [ 422.817950] ? sget_userns+0x6d9/0xf20 [ 422.821844] ? mount_ns+0x8f/0x1d0 [ 422.825395] ? graph_lock+0x170/0x170 [ 422.829204] ? do_mount+0x564/0x3070 [ 422.832922] ? ksys_mount+0x12d/0x140 [ 422.836730] ? SyS_mount+0x35/0x50 [ 422.840279] ? do_syscall_64+0x29e/0x9d0 [ 422.844358] ? find_held_lock+0x36/0x1c0 [ 422.848436] ? __lock_is_held+0xb5/0x140 [ 422.852518] ? check_same_owner+0x320/0x320 [ 422.856854] ? rcu_note_context_switch+0x710/0x710 [ 422.861800] should_failslab+0x124/0x180 [ 422.865872] kmem_cache_alloc_trace+0x2cb/0x780 [ 422.870553] ? __kmalloc_node+0x33/0x70 [ 422.874538] ? __kmalloc_node+0x33/0x70 [ 422.878524] ? rcu_read_lock_sched_held+0x108/0x120 [ 422.883557] __memcg_init_list_lru_node+0x17c/0x2c0 [ 422.888585] ? list_lru_add+0x850/0x850 [ 422.892573] ? __kmalloc_node+0x47/0x70 [ 422.896561] __list_lru_init+0x45e/0x7b0 [ 422.900637] ? list_lru_destroy+0x4c0/0x4c0 [ 422.904964] ? __raw_spin_lock_init+0x1c/0x100 [ 422.909558] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 422.914584] ? __lockdep_init_map+0x105/0x590 [ 422.919091] ? lockdep_init_map+0x9/0x10 [ 422.923160] sget_userns+0x6d9/0xf20 [ 422.926878] ? set_anon_super+0x20/0x20 [ 422.930861] ? get_empty_filp.cold.7+0x3e/0x3e [ 422.935450] ? destroy_unused_super.part.9+0x100/0x100 [ 422.940736] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 422.945762] ? kasan_check_read+0x11/0x20 [ 422.949923] ? rcu_pm_notify+0xc0/0xc0 [ 422.953812] ? trace_hardirqs_off+0xd/0x10 [ 422.958056] ? cap_capable+0x1f9/0x260 [ 422.961959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.967499] ? security_capable+0xa4/0xd0 [ 422.971656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.977201] ? ns_capable_common+0x13f/0x170 [ 422.981624] mount_ns+0x8f/0x1d0 [ 422.984997] ? rpc_pipe_release+0xb70/0xb70 [ 422.989329] rpc_mount+0x9e/0xd0 [ 422.992709] mount_fs+0xae/0x328 [ 422.996086] vfs_kern_mount.part.34+0xd4/0x4d0 [ 423.000677] ? may_umount+0xb0/0xb0 [ 423.004396] ? _raw_read_unlock+0x22/0x30 [ 423.008551] ? __get_fs_type+0x97/0xc0 [ 423.012449] do_mount+0x564/0x3070 [ 423.016002] ? do_raw_spin_unlock+0x9e/0x2e0 [ 423.020422] ? copy_mount_string+0x40/0x40 [ 423.024666] ? rcu_pm_notify+0xc0/0xc0 [ 423.028567] ? copy_mount_options+0x5f/0x380 [ 423.032979] ? rcu_read_lock_sched_held+0x108/0x120 [ 423.038002] ? kmem_cache_alloc_trace+0x616/0x780 [ 423.042860] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 423.048410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.053954] ? copy_mount_options+0x285/0x380 [ 423.058452] ksys_mount+0x12d/0x140 [ 423.062084] SyS_mount+0x35/0x50 [ 423.065466] ? ksys_mount+0x140/0x140 [ 423.069273] do_syscall_64+0x29e/0x9d0 [ 423.073161] ? vmalloc_sync_all+0x30/0x30 [ 423.077323] ? _raw_spin_unlock_irq+0x27/0x70 [ 423.081824] ? finish_task_switch+0x1ca/0x820 [ 423.086330] ? syscall_return_slowpath+0x5c0/0x5c0 [ 423.091265] ? syscall_return_slowpath+0x30f/0x5c0 2018/04/05 10:22:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:46 executing program 2: socketpair(0x15, 0x5, 0x8000b600, &(0x7f00000001c0)) 2018/04/05 10:22:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:46 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x2c) 2018/04/05 10:22:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:46 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x2c) 2018/04/05 10:22:46 executing program 2: socketpair(0x15, 0x5, 0x800001f9, &(0x7f00000001c0)) 2018/04/05 10:22:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 423.096206] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 423.101582] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 423.106440] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 423.111628] RIP: 0033:0x4552d9 [ 423.114999] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 423.122712] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 423.129986] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 423.137261] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 423.144528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 423.151796] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000000f 2018/04/05 10:22:47 executing program 6 (fault-call:4 fault-nth:16): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r0) socketpair$inet6(0xa, 0x0, 0xfffffffffffffffa, &(0x7f0000000000)) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:47 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0t', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:47 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:47 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x2c) 2018/04/05 10:22:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:47 executing program 2: socketpair(0x15, 0x5, 0x8000013e, &(0x7f00000001c0)) 2018/04/05 10:22:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 423.838839] FAULT_INJECTION: forcing a failure. [ 423.838839] name failslab, interval 1, probability 0, space 0, times 0 [ 423.850184] CPU: 0 PID: 30698 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 423.857034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.866397] Call Trace: [ 423.869003] dump_stack+0x1b9/0x29f [ 423.872655] ? arch_local_irq_restore+0x52/0x52 [ 423.877337] ? __save_stack_trace+0x7e/0xd0 [ 423.881679] should_fail.cold.4+0xa/0x1a [ 423.885777] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 423.890892] ? kasan_kmalloc+0xc4/0xe0 [ 423.894806] ? kmem_cache_alloc_trace+0x152/0x780 [ 423.899660] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 423.904862] ? __list_lru_init+0x45e/0x7b0 [ 423.909110] ? sget_userns+0x6d9/0xf20 [ 423.913005] ? mount_ns+0x8f/0x1d0 [ 423.916554] ? graph_lock+0x170/0x170 [ 423.920367] ? do_mount+0x564/0x3070 [ 423.924088] ? ksys_mount+0x12d/0x140 [ 423.927894] ? SyS_mount+0x35/0x50 [ 423.931446] ? do_syscall_64+0x29e/0x9d0 2018/04/05 10:22:47 executing program 0: socketpair$unix(0x1, 0x8000000000000005, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@can, 0xffffffffffffff33, &(0x7f0000000180), 0x0, &(0x7f0000000040)=""/93, 0x5d}, 0x0) socketpair(0x10, 0x2, 0x410a, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r2, &(0x7f00000001c0)="f23369f4519fbad45c67825607e3c734603f49e9f1ce19b7edcb2c534d39e12ad47b95b0c0741d55b4d084d15c8b68e6ef6fc47ef1af72acf2d6e8", &(0x7f0000000200)=""/39}, 0x18) 2018/04/05 10:22:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:47 executing program 2: socketpair(0x15, 0x5, 0x80004401, &(0x7f00000001c0)) [ 423.935529] ? find_held_lock+0x36/0x1c0 [ 423.939604] ? __lock_is_held+0xb5/0x140 [ 423.943690] ? check_same_owner+0x320/0x320 [ 423.948027] ? rcu_note_context_switch+0x710/0x710 [ 423.952982] should_failslab+0x124/0x180 [ 423.957061] kmem_cache_alloc_trace+0x2cb/0x780 [ 423.961736] ? __kmalloc_node+0x33/0x70 [ 423.965775] ? __kmalloc_node+0x33/0x70 [ 423.969762] ? rcu_read_lock_sched_held+0x108/0x120 [ 423.974790] __memcg_init_list_lru_node+0x17c/0x2c0 [ 423.979816] ? list_lru_add+0x850/0x850 [ 423.983799] ? __kmalloc_node+0x47/0x70 2018/04/05 10:22:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 423.987793] __list_lru_init+0x45e/0x7b0 [ 423.991874] ? list_lru_destroy+0x4c0/0x4c0 [ 423.996202] ? __raw_spin_lock_init+0x1c/0x100 [ 424.000793] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 424.005820] ? __lockdep_init_map+0x105/0x590 [ 424.010326] ? lockdep_init_map+0x9/0x10 [ 424.014399] sget_userns+0x6d9/0xf20 [ 424.018116] ? set_anon_super+0x20/0x20 [ 424.022100] ? get_empty_filp.cold.7+0x3e/0x3e [ 424.026690] ? destroy_unused_super.part.9+0x100/0x100 [ 424.031980] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 424.037006] ? kasan_check_read+0x11/0x20 [ 424.041165] ? rcu_pm_notify+0xc0/0xc0 [ 424.045069] ? trace_hardirqs_off+0xd/0x10 [ 424.049312] ? cap_capable+0x1f9/0x260 [ 424.053211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.058763] ? security_capable+0xa4/0xd0 [ 424.062918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.068463] ? ns_capable_common+0x13f/0x170 [ 424.072884] mount_ns+0x8f/0x1d0 [ 424.076255] ? rpc_pipe_release+0xb70/0xb70 [ 424.080607] rpc_mount+0x9e/0xd0 [ 424.083985] mount_fs+0xae/0x328 [ 424.087367] vfs_kern_mount.part.34+0xd4/0x4d0 [ 424.091969] ? may_umount+0xb0/0xb0 [ 424.095608] ? _raw_read_unlock+0x22/0x30 [ 424.099766] ? __get_fs_type+0x97/0xc0 [ 424.103671] do_mount+0x564/0x3070 [ 424.107222] ? do_raw_spin_unlock+0x9e/0x2e0 [ 424.111651] ? copy_mount_string+0x40/0x40 [ 424.115894] ? rcu_pm_notify+0xc0/0xc0 [ 424.119798] ? copy_mount_options+0x5f/0x380 [ 424.124214] ? rcu_read_lock_sched_held+0x108/0x120 [ 424.129238] ? kmem_cache_alloc_trace+0x616/0x780 [ 424.134093] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 424.139643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.145190] ? copy_mount_options+0x285/0x380 [ 424.149699] ksys_mount+0x12d/0x140 [ 424.153376] SyS_mount+0x35/0x50 [ 424.156753] ? ksys_mount+0x140/0x140 [ 424.160562] do_syscall_64+0x29e/0x9d0 [ 424.164453] ? vmalloc_sync_all+0x30/0x30 [ 424.168605] ? _raw_spin_unlock_irq+0x27/0x70 [ 424.173282] ? finish_task_switch+0x1ca/0x820 [ 424.177787] ? syscall_return_slowpath+0x5c0/0x5c0 [ 424.182731] ? syscall_return_slowpath+0x30f/0x5c0 [ 424.187686] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 424.193064] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.197922] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 424.203636] RIP: 0033:0x4552d9 [ 424.206822] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 424.214537] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 424.221810] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 424.229082] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/04/05 10:22:47 executing program 0: socketpair$ax25(0x3, 0x2, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair(0x1a, 0x801, 0x68, &(0x7f0000001b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001b80)={r0}) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x4, 0x7fffffff, 0x9, 0x10, 0xffffffffffffffff, 0x2}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r5, &(0x7f00000000c0)="d40967c9e3cd"}, 0x10) socketpair(0xa, 0x3, 0x1, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000001b00)={r1, r6}) mount(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)='gfs2\x00', 0x10, &(0x7f0000001ac0)) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000180)=0x8) sendmsg$kcm(r4, &(0x7f0000002fc0)={&(0x7f0000001bc0)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x8006000}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000001c40)="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", 0x1000}, {&(0x7f0000002c40)="9944f1be7d4d5e1324275e510d08faad5b76df730f3c880ad6c65d322687c1d9b8e6ea725509bf0b94f29c3c3771b111600248e808a2eeebcedeea6d218cf64cf1f4d40d34d42a0b1cbf95e70af2da76bc2061e101a54f646837b17d2d79cebc36ba42910e1e5ac138ff46a30172bea1e15dbd75248c2d31b03ffcfe54caa1a8cae6c3ad0225fbaac5a9966d3509b1a8bb573150be9075b9b073c6833979d9aa0c774de5b32ff2f470a94c611233fdc21f784a79359d4cce2f80b664b7ba4c95b131673fa72fae20643d7d3d8e779f3151de1b41e04c4fc3c5ad0aacbfda0b4e3565cbe5970faa0d3b86a4b386c641fa6f313f", 0xf3}, {&(0x7f0000002d40)="e80afe42ad7b53f76f714b5c1633a7bfb97025b6d94ef794f4dce19ae036bd6a1de4bdd6dca29d7f90ce45b5f38e9060191b342b24d7d255ff9ccd3ed4429782dd3b8122a1b17cf5841fda65", 0x4c}, {&(0x7f0000002dc0)="dcaa0fd0d07619aa95d989e8c6b1debfce8de60e2ce73ab6d1fe27dedd98d955d566fa6757a49d370d458e6fcb66d0d7a84a15438193c2340f318efd114291146d434cba8360d6cc85fc909af3d3f41b6b8845e7d5987531240718888f4480640c62622b6818d622c9ffcf7104bf71fd5b54fd48ba87ee8c8dd84dba877eb5b0aff2e740fab89dbc4e06740e82f1484fabea9d83b68959aa3e7be5fe168c9b48fe869bf1db31c851c96792", 0xab}, {&(0x7f0000002e80)}, {&(0x7f0000002ec0)="0e50d32539d658e85ceb99d4c8bfee7b45a7cebbd9c9c69b75d443474059455115db53e3a4057c68e127fcd70ad3a6f7fdb7b6d335c062dcb3e8b06257c0160b7e18593d84a7e4db12acab27625a532004c6fb95b86b13", 0x57}], 0x6, 0x0, 0x0, 0x40000}, 0x20008000) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) sendmsg(r3, &(0x7f00000019c0)={&(0x7f00000001c0)=@ethernet={0x306, @link_local={0x1, 0x80, 0xc2}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000280)="40e10b086384384197a441fb9dbffa8dc445482a7ad61ab5d5a8da928fdb54228bba6b2a82bffce30e031137eb1aa4b17c445c2e884334ad55b72007f93a576b394d08f8dceba9e82df7e7ec60c1197044ff24c7741ccdd107a8dc537d39dc3a352dab00b4f97fd22767512e616cd9ddb9eb4b57b5b7319b67ee4e9db6d9589b9747408cc3ac591b580e7ef5c0e68e1286e622cc3c57e4f62d0c2f9396b9f52f20d8a38ec90ec5f7b15bca13b0d1057d2b37653882f59927f36bbd732a787cc0f262f72d7523b4", 0xc7}, {&(0x7f0000000380)="edc1324d58c0fa363b72324842f7ac32e43ce0d0402b31715066f68e750a09d99c532653fc8bbdac809e038e6e8420e1f534dcb6a20c", 0x36}, {&(0x7f00000003c0)="ce69b90bbf967f5d0859fdea1829a566ba3e3279bd7d63c342ba628c8d5c5d3637ff5f0108588eefa55ee8", 0x2b}, {&(0x7f0000000400)="1d4204e23921406af375b65abac93c5e7145c46eb3583f0fb5dbc962cebd0c19c5c0a64e48b92bb87de839fd8d6f1131e451be7b6e2e47870298747062405effcf1b1d32cc7984be1f7fc66af2d054fe49c06972a5f94931f466cb5f18d863c5ff8619cb316eac66e74b4fc103cf947bbaea", 0x72}, {&(0x7f0000000480)="3d2ab0038c443676", 0x8}, {&(0x7f00000004c0)="61af71e2fb4c2bf0c8aa389972460b8b88cd27b94daf09c1c3ebdc8997b8e9ae", 0x20}, {&(0x7f0000000500)="256e97da4d1f944fe7e868818655ffa4ede7ad4d1a22e4d8d733f2dbbe9dc3a7111b5726ee91ebacc041cec4b35394ed5bb83113930d432a75582948bf18aad3edf5d5236acc11bc7ba5583c637af0e39dc4d68abef52a243561c67d92f5e59faeacc0f33b2e5d6a6b6cacee4a53a8739bab25b87b4f44591c3a51f61b638b7c4308337c7bf02a77856baadcd3ca2f61e106a2b156ab3e64fa158d7af9", 0x9d}, {&(0x7f00000005c0)="0bbfa99706a6e804623cd7404e03f11cb2225ad5885c4e3881a12e82d8a2deebf9b0c604c6a12d3c7dde4a1dec66", 0x2e}, {&(0x7f0000000600)="ba3138d422c30e5a554f154236ae6491aeebff", 0x13}], 0x9, &(0x7f0000000700)=[{0x20, 0x11e, 0x9, "a64de0ea487d5f01c4756cf761abe1a5"}, {0xf8, 0x6, 0x5, "55a0877a38bdb6d86710cced6a3ff7e777463b8db673ced01a577ac8ce043f216e5456b8d732f3fab5b7a0b0a3719c98d86424996b87f0974c1603dc5168c4e6bbea912694df57cc50dfefc68ab193196eb1d2b0ded3ff49bc063722d06745025e633610d11ffc26eacaa36873450900159e4f3430472bc4bc09bec87afd3086d3d105983b6fd79c3687b0c1f6e37403d9bee3580648c0e1e4cf69bcc7bd5847dd85b98a68f6e09665a7f15df02c7c9f36c16439f4263d0faa9db92cf658883ca2de3c5d3e7434b71ee03df259a8acebaa732bd97bd7871cdcefc6d73e8913cfa6bf967500a9"}, {0x70, 0x19f, 0x6, "07dadc20d29f0ac744caf494c96b412115534b9250f06d5b52a391bfb86587015188e7461377b438b901fab60bc1f678317c0bfbca5a060c057b3641d003c89bd27f1eeb7d62d84a16b8a72361314c53b836f9580f01df65e9"}, {0xc0, 0x11e, 0x3, "f333196e6d56c0988c211a6ba0de0f55c24203a0210a472b2845eab8d57664a9410abc53a98caaed625bbfd2ff333321a346ef9f7da5f28d1092416847442c664e20d87ec9a2801dddd27ed60ff39e1d8d3beb3dc225673729e91cc4c3125dca9d1ac7f2df34ffe51adfb85eeef7d567484fa49f2d5a806572f1b0a84957c25e038480b6d9d50cdf1e89ddc81b53c1edcb030cfbd4ca561e97b02141d27a7521569707416fda95832f90362b5953"}, {0x38, 0x0, 0x7e, "dbf578cfceceb7783e09a3d27397c0d5744bf6a068c6c97af0af5e47b9adf562d04dbd42472f"}, {0x1010, 0x11d, 0x400, "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"}], 0x1290, 0x40408c5}, 0x20040001) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002e80)) 2018/04/05 10:22:47 executing program 2: socketpair(0x15, 0x5, 0x80004101, &(0x7f00000001c0)) 2018/04/05 10:22:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 424.236356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 424.243626] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000010 2018/04/05 10:22:48 executing program 6 (fault-call:4 fault-nth:17): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair(0xa, 0x7, 0x1000, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @loopback=0x7f000001}, 0x1, 0x2, 0x2, 0x4}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000000280)=[{0x1010, 0x117, 0x8, "94a0c9544f42ce8ca8be02030c79aebe80b9ce928e0096ee9ce53b2ad53c1f18f13ab49b1019a81dd968b4f651d0e648496020c7e0482c8eba6dbeec078ffc55a24ef74c8a42413cba5dd73dc180c51aa980a5496e1e9696e83838f57b451a89084a7d002c8e90ddf28bad90bd0a02030843f9a6709e9c095bb2c238de040596fa6d6d8972c2bbb18d25e2f01627044bc02e888e9972ec21d18b938f50af0594fa188ef4cd9673ba9e1cce4b76febafbf8766b60f612985a16614160075a00a9cf10f6e30b53a83e8a2de207ad7e2e223063f5d4255d31d3a5fcf4e8c50bed8c437925acf5f0a0bd0551bf68242be003ada30be01d76faba8e6aa6768f364edf393e4bfe5b63f5bf271f067cc76019096b31d7d699deb29af27896aa4d22bd305142eeddc31cfda8312df9a86e21f7a379c7063a98a1b49bf0cd84207f97b7bce1be9145cff8d0bcd23ad1ca4e69bb646d7870c14b5ab445fc2b5a3292bec880a2980c3221bcd91e149de8e8e762861542a606cb06a19d12ce3bda587b5b8eb88d62ed3722569cb295f6fac1bf79f5e1c8c2be36f10570a13be53333c33c60dba3a88b73276d3bac104dd13b5d0c88cf5a968d633814d7cd00f031aa9f59a2bf776158925dce1c6b010e5ef917db8fc10cacc3df936eab685495acfa61ea03d6070b75a1804cbf8b27c500bbe35bc3589fe44f4cad6332a558aa0704b1fa6d7c2016042a9b95f37bc53107e3927b3081337eca0fd853382f139f6b6b8eb56558266e01356c9f46da4c43bbc35c574394a481415a5ea6bc5bbcbca716b8a1588005c40af44c8c7d408398cfd46032e9bb520e1bcd5cb188166d799b377c00304f0536ccc0041ae75c04fe2e67ab407d4839702a9a32b8aa75034fc8bd24067b774ff74116e5aebe767b82312c2962a4d719ad29cd7f4ee4561f53e20250bbcf972fc00e497832422aff1222f5b389560a5b48f2f992be0424e548424c8178969019d796b9f2c8f1ca58ad81efb4a15dab027108c930f9d7781dc3473cfd1d71892e793536a24f20388e3686c2226635c30590990f146d6e9116bb54516ae9efbe702ed81ce3211dd1c227f57d036bf666f38b77fb3c34ef0add06920f3e9325ff912962d6638191c25df6a719eabdd895bb1c4226929d73ebd7412b80cf49e4860eca2d374bff64c2ac7b24cc4198a4062311a5276a46460caa2a0e5e0bae1122f99d0d77315171b03573f5639796099c81dd0d659eb6b4dad59aa97c896871cf8b284eeeb72f61dba2fdf837df1baaf43e5531dab7994aae43ffa3b0c4e11f8596abf2f8c6500bb791f11e316b0b203c109f815aa42d783e565a44b4b47c09f8a3687a14b56cdc18c1cd3029ae078dd8361fa39c5b8fdac0053205fd4a435aea0df0a92a1fcdac6d6e188406b6f3fe394cedb0263b12f15b1dc2694aff8341d96c9004c07c4f1a7edee8f7b25ef2b84a54fe911031bbee1ec2f3d195d6a62b6ec84c1ed4c9599ff1183bffaaeacd5431ac5509f5440eeae6580af00803ed93e0a031bdc37352299ab1d7fd0fdb92a2836a5d16db9a7ea5bd6cb380d6c7af15c51d283b40bd5ec10b3eb20da0da3b2f45a1c3ade6ca6a81854fa1df8419fcee300a82127905e590011e905e05d3ccfd1650cd82ad95748b1d984a13b1d9389cafb949497d6635d9cd4712d403e3ad9c7194b2784faa4e6778302c289b319c5a2672dd6085758c897c3d84c1eff531c54369ce02adcd60e1e0688a8b5530297edccf7836894b19055543365f2f5fee1b739837be29790324ccc0511ad4c2858a2df95b3729597e3df06d3fb71dd4558e9c215e89977f8074ffc72134782af483d122eab883d9238547cb43e3863634522edfd0154fcea1d1bdb45f78fcc75c5682abe18bab446546791cdfcd136e39b198703a40d130e1e44056062967f8cb5112b2437af9fcb85067e462318442bd16095195247774ad689f11d0c24b33ff3bc16f039910675c2dde7bf6bac941f192aa4d4ca9a51678d068434a112d4fb8530be07e04cdacf9373799bd1654497d3ec0c05e71b4c4ad4284f75571dfb1f5d0960ea229aaa01cfe9cec2590bf313b38db037f43ff3b2a665f17e6014a586601506bb7bcbadc2e3b84de61c16b70da1ebd310153ee2295c84855e6e723107e74b21e8b2f847984bbb5bddf8285dfe2c29bcd7bb6db56d1bc944ab1f46b99dd4e31059c733f035b9935cdf74ae27fb7cdbaf1c5871312b3e38a79d1402dca911e601e89fb351d7b0e40d539662fefc596a3705b08c7be35c0633b8629cc96b0121d2874fbbd214b60c3284db8875ab115a5114353abb5ebd6125bb6f7072a6d2bde556f6aedd0149e81da117bad198730e71778f8de1e524286e86cffbeb7d5d133db0a101df84013823f4059ecc0f23bbe68f6599f4c51b7a3eb1993dd045f425ce8fc9f2e1385b9803705f64b1be13a7159bc88f41522a14e3dcba9a9bc206c425e15f848e4cc2b84ef75ecd417567c511dee64522e684bd4cef1129aa30c89d7067b7eba24fc62105b29e9cad0adef086497dadad3e1fdebe2e57ab4223a0834782e002b67e04efa190ba1e99d5e21b7ff074940a0e43c02c0584c7a0cfe939c33284fd22d180927c1d9009f1ce504b797dcb274394147cf91ef0d28b57af390fea7846245fc262da3f3a3fd21244d347cb20b7a3e954a27e45dc5e27cde833790c9c72dcf3a32a2553e3d2e3c7c9b0baf6bbf388fa2d152e1530d420a700adbc9a2233d4365cb5f65b67f6ef8696e416d1cdc40ffdc81698969a852b81105ed01e3f055579cb89c061d9dd59a1a6893f10c7314db7b25cb51fa512a4a56a3a974f3ccf05142001d45f895eb9a4fcab98f08bb0fc1b5346fcf00a23c8c6a615ccf22bc114b65a0e591e4465c18e2cc4a367730426866805a65cc099bc0a143feaa8e427bf6d27de91073a5abf05a160cb4bb2d3c55ce3f65e11a56fa509eaf8c6fbcc2256edc691a6382c3bd542bbbc49d87167167f6605f0da8fc111e91972342c7612cf9f4f704af1475ed0b7715c10bb482db34029070df975f3ddb6f5652d0eff20ed6d8cb171f2f404599499974fd17dcdae0b3c4ac73956c07bf5addba95aaa0dcb39ee2a68b4783fc08a0137b37d26ae17303c806e58e82161e0b8696b669dafe8b5fa0aab641f10203cdb71631558fa5402eae1352fe25c843c6f9bd035bfa44287afdffdccca76ab27a3eba216dd2eb4394c8e98944b74cc06c82a6c49f25b350d43874af28ed632ec828ca5329c1086203098bfe25c14bbb5b3eb546d5a643c821e6b85f5c17257cfa129dba3383579d9820bbb4ba1c62cc5d9d7421ad04110981532edaceef6d50cdf0cd7bd40ef08ebab0370c761d67cade03c2401c413a6ec906bb89f673cdbe0d99fcba1da2340df6dfdaea29c8972713ac8eef0ce0eabb82fca97c8181fc9cfc275659192f92f313da8b706ca94c432de6cc9c4ce90af2eada8585743588edc4127597471ed91efa6d7395996f3877fb311122bb34afde99316cfa898ba33b6b3f0249c1e31893d68784077c246ee1860447dff9825edf72d00451902c6145dfd2a829c2948ae7facdde53e90eb1dabd56075c45ab15500ef32d9f09b3afb52eaef0c3a0e02590d13ec1de577aa57534b62aad447e19a41b9f10a99cfb5c6523ee30c2bae982bfeded38b2b186617b1fa487908724d49a9eb565b349a6b7b297172c7dddbdc5c73ef0222f7d0a7cd7b12ac0ef37e55a562e9f421c52d2354996283939705fa9a1ef246c879292336e010c448afd9898068bdff04d90d5b9f23e20614a1c4935b8fae8dec3d27bd29b4b8996121b3f9e6e5c2d3e0e3329fe77fff28454b3bd5000534ae72e8185541985e8553cf87417cd16ff1c880b877ab08dbd3cc6a59668b26e0a100459c6671391bd0ff23bd0baf05feda6b447c1beb77afa015ebcd36312a41e449abd98ecbc22996753c99f4828c9a15926d7e61752ee388dd9c7271e191815d9bc211fd2ba3cc565599d9e6c84307bf503d05a7d722c4ae87f3ce9bf47532ff20ece653f235fe1f28cbdff12fcbcedc9045a1c39dbb9dac6f46272676862873eaa6b966623343ddbcca3900d9affb3a04b1de13944007c7de9b03f485d60b99e67de9d8e90884c6e0fe0b428cb88a783c89fb70e2e809ec7780d543530274693ab6af3a1168fb3420e4e2e53b70c29c2acb23fcb9f8c18046a200ccd581e9439b52b9bf3dc7ac132a195ee2c1a060fd3dea14e4361b381a372de2c820eadf1e94651a2af8e5d1bac49a68f52eaaf178692865663643be7172821cec3cdcaeb5d125d9305eb9e47974d47c6c64eec29a4b8cf4685b1ce9731af72a3bd43963d37f2950f5e1383ff5a490d7705b84b850f6348c55a3df93f0f263db532420bb58271283e3b0477732ae1029bc932175881823b2fab1ef5070ab52147e60dca9b41b3130cf7f632c1370b9f78c2755c9027475d1a4c95d225017cacc820dfd8c191f7c5c2566dfb2a29c168c9e463fc70633b623a03b17fb90e28f9627315b8c05a354f00332ed2082f4e9ce2eed3e68cfadd5121a5382dbc301fcb14f692a82e5940b62e177dc94d083b4f7a63fbf861b08c8760e48a04b4fba3003f8f1b3e73976670d5bd456ef80ca00b77330ded9d3e7a1b0a95edaebe65c992dc484cd28ddb590d58f1aeedd1fa3367c03c20fb09f9913c5c0b04dd229b4a0b98c61a98d457253d23600b9923d429238a71d343b3c5427a10c0ebd0c0c5ffe0752973c35c89682aafd9ecfb08314af7f7a69230b269c932e6f5b6fe78d2e6b565ad6d515bf23e1b28ebceb85c5bd4546970afae23c1189a2a5ee52ec09afe33be92db8b364c49672fd5885b377e9e1a184c515bcdc46251433582b8e4aa66ab28113792ee7f31a1a15d62937245cc270b5f2f0381c4b45188dced0899fc92c0034b515b24376574b844d9760988d3b0d9aff54548797622f07318f94737b87b98d7c3b597c88e2a16f16cd673c3db57280a18c3c23c361d7f043de4357019f441a85a538148a86dbd2124a0f0ccb4f7e693547695398e99d9f77ec6f23c1a4034185bb434be242c2f3986c510c3313937b3cd2a6bb3f9748185148c3c96b356a5981ec42df916e4299e1d067d096c8f3260d88b49ee0fbe8d1314d313315219bbc5717d8ec4c75d37d293fe96c61aac7cb49a97f514c285a0d9b965e90ccd7811ad06ede5165728f83ee2e58909a8753876dd609a99950fc16dcfc76a5ebc544d5b5806de3feca08d47adf6e2c5ac02745a298f1371bb604cc0526a9e2766140d1929cb4535d8c0497f0eaf40a59c0a8379a8e1836c9480c04e17fe7885359cd1b988b6d7403f39785e6f4323099f825ffbd43418d22bc82dc77126e59bbc3eca3ec2d81df88b3651aed64613840cfce2158ee74e5f9aca12f64fe1d11098c9ed783c83cfd6f0bdb056c1cbce2d8c95a32f11bc65c1468511ba3d3ac1b3c470c853f141c1d123cf31c6f40c98dca12a89b285bc03a715217a164ddb6c469c48d77f336567a3fb67b03b01e6cd47981256dbc07a761f0023693cafb699e1d2b273974c6eef1b52e6e6ac73dd3a122f57e9e5f0b9b3279067e9e30ea3aa89ea1e9fac393aea03c444e8ad69d8f9b555b3fadf8b0a70a872d395434626c8c87b12afe2ac8582528ce34b1a78afc5727bd084bdc74c8c5dcf021e2eaece493ed85a9d5e05de2eccd4c45649a94e7d17a04de92214557b3991836efb1653ed8ab4c894978ec2b34974cd26905ae36bb2"}, {0x1010, 0x10f, 0x5a9, "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"}, {0xb0, 0x0, 0x1f, "1782e3689bf65bb751197c6e6ee2ff7ffcd8ac09019d026e6298245dd4803e73f00fcfef889beaa93e76b10939d8432c87283ae70c54b05f01a1b6f62bad71d9ce61a00f4d58dbed7c233cceda4fc5ce36e1eb2eb1ff05efbf9c7131d70a9056b70411a922a1ce1a36a6cf038b15e11b1a5090f236c804e765311ece541785b4a85e1bf10214ee6d52cde21e27f7cffebaeb63844b18eda3b3f903ca"}, {0xb8, 0x0, 0xfffffffffffff629, "dfde556d67e56316cb12d6bb2ea9239476fb4e40ac39402148fa8b19d9c1e8ab6f325d7072f534ecd579167b53992377cbde7ed9df6fca0734d295b8b969f5704a1c068813d5bce737ae25bf7ce19346856a90cb7add31b1656734681211bbdebd24e1c8c351a8435188b8fb5965232de64752036b8c279ace03a9c7fc2662bad07437d7a68854904b2713a61c189966cc47c3f3e7a353a4048da21ae25f167465a9b001a4"}, {0x58, 0x11e, 0x85b, "b57d178ea42230d977c663d04bbf4226350db5ad7a20cb54d34008c484b07aac523d3c42e81bfdd4f9cef31ade44b52a7af40c61ee19d96c6ce0d54d6ac33e8b0f24d9b38a2e01"}, {0x58, 0x1f4355214b2c8192, 0x8, "fc36cd2dfa4e7595bb845fd1c839a809b305bd5471f980634464ac892b7e28c5b23e7b356d2d6b37c30c4aa242fa482421a8ab558c183a5a3f448aca4d03d5a9d90d20f491"}], 0x2238, 0xc800}, 0x4000000) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:48 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653092", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:48 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:48 executing program 2: socketpair(0x15, 0x5, 0x80006400, &(0x7f00000001c0)) 2018/04/05 10:22:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:48 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x2c) [ 425.048453] FAULT_INJECTION: forcing a failure. [ 425.048453] name failslab, interval 1, probability 0, space 0, times 0 [ 425.059857] CPU: 0 PID: 30747 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 425.066708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.076068] Call Trace: [ 425.078679] dump_stack+0x1b9/0x29f [ 425.082337] ? arch_local_irq_restore+0x52/0x52 [ 425.087021] ? __save_stack_trace+0x7e/0xd0 [ 425.091367] should_fail.cold.4+0xa/0x1a [ 425.095447] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 425.100565] ? kasan_kmalloc+0xc4/0xe0 [ 425.104482] ? kmem_cache_alloc_trace+0x152/0x780 [ 425.109341] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 425.114542] ? __list_lru_init+0x45e/0x7b0 [ 425.118790] ? sget_userns+0x6d9/0xf20 [ 425.122688] ? mount_ns+0x8f/0x1d0 [ 425.126237] ? graph_lock+0x170/0x170 [ 425.130047] ? do_mount+0x564/0x3070 [ 425.133768] ? ksys_mount+0x12d/0x140 [ 425.137575] ? SyS_mount+0x35/0x50 [ 425.141299] ? do_syscall_64+0x29e/0x9d0 2018/04/05 10:22:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:48 executing program 2: socketpair(0x15, 0x5, 0x8000af00, &(0x7f00000001c0)) 2018/04/05 10:22:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0x0, 0x9, 0x8}, 0xc) recvmsg(r0, &(0x7f00000006c0)={&(0x7f00000000c0)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f0000000140)=""/179, 0xb3}, {&(0x7f0000000280)=""/168, 0xa8}, {&(0x7f0000000340)=""/215, 0xd7}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f0000000700)=""/104, 0x68}, {&(0x7f0000000200)=""/8, 0x8}, {&(0x7f00000004c0)=""/62, 0x3e}, {&(0x7f0000000500)=""/232, 0xe8}], 0x8, &(0x7f0000000680)=""/13, 0xd, 0x3f}, 0x2021) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x37a, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 425.145589] ? find_held_lock+0x36/0x1c0 [ 425.149677] ? __lock_is_held+0xb5/0x140 [ 425.153764] ? check_same_owner+0x320/0x320 [ 425.158097] ? rcu_note_context_switch+0x710/0x710 [ 425.163078] should_failslab+0x124/0x180 [ 425.167160] kmem_cache_alloc_trace+0x2cb/0x780 [ 425.171843] ? __kmalloc_node+0x33/0x70 [ 425.175824] ? __kmalloc_node+0x33/0x70 [ 425.179809] ? rcu_read_lock_sched_held+0x108/0x120 [ 425.184850] __memcg_init_list_lru_node+0x17c/0x2c0 [ 425.189876] ? list_lru_add+0x850/0x850 [ 425.193855] ? __kmalloc_node+0x47/0x70 [ 425.197845] __list_lru_init+0x45e/0x7b0 [ 425.201916] ? list_lru_destroy+0x4c0/0x4c0 [ 425.206242] ? __raw_spin_lock_init+0x1c/0x100 [ 425.210837] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 425.215861] ? __lockdep_init_map+0x105/0x590 [ 425.220376] ? lockdep_init_map+0x9/0x10 [ 425.224448] sget_userns+0x6d9/0xf20 [ 425.228166] ? set_anon_super+0x20/0x20 [ 425.232151] ? get_empty_filp.cold.7+0x3e/0x3e [ 425.236827] ? destroy_unused_super.part.9+0x100/0x100 [ 425.242120] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 425.247150] ? kasan_check_read+0x11/0x20 [ 425.251310] ? rcu_pm_notify+0xc0/0xc0 [ 425.255207] ? trace_hardirqs_off+0xd/0x10 [ 425.259456] ? cap_capable+0x1f9/0x260 [ 425.263359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.268910] ? security_capable+0xa4/0xd0 [ 425.273072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.278621] ? ns_capable_common+0x13f/0x170 [ 425.283051] mount_ns+0x8f/0x1d0 [ 425.286426] ? rpc_pipe_release+0xb70/0xb70 [ 425.290752] rpc_mount+0x9e/0xd0 [ 425.294130] mount_fs+0xae/0x328 2018/04/05 10:22:48 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x2c) 2018/04/05 10:22:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r0) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 425.297509] vfs_kern_mount.part.34+0xd4/0x4d0 [ 425.302101] ? may_umount+0xb0/0xb0 [ 425.305740] ? _raw_read_unlock+0x22/0x30 [ 425.309894] ? __get_fs_type+0x97/0xc0 [ 425.313793] do_mount+0x564/0x3070 [ 425.317350] ? copy_mount_string+0x40/0x40 [ 425.321594] ? rcu_pm_notify+0xc0/0xc0 [ 425.325508] ? copy_mount_options+0x5f/0x380 [ 425.329929] ? rcu_read_lock_sched_held+0x108/0x120 [ 425.334954] ? kmem_cache_alloc_trace+0x616/0x780 [ 425.339809] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 425.345355] ? _copy_from_user+0xdf/0x150 [ 425.349511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.355051] ? copy_mount_options+0x285/0x380 [ 425.359559] ksys_mount+0x12d/0x140 [ 425.363196] SyS_mount+0x35/0x50 [ 425.366567] ? ksys_mount+0x140/0x140 [ 425.370377] do_syscall_64+0x29e/0x9d0 [ 425.374269] ? vmalloc_sync_all+0x30/0x30 [ 425.378423] ? _raw_spin_unlock_irq+0x27/0x70 [ 425.382923] ? finish_task_switch+0x1ca/0x820 [ 425.387425] ? syscall_return_slowpath+0x5c0/0x5c0 [ 425.392362] ? syscall_return_slowpath+0x30f/0x5c0 [ 425.397306] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 425.402683] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.407540] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 425.412724] RIP: 0033:0x4552d9 [ 425.415911] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 425.423626] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 425.430895] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 425.438177] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 425.445449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 425.452757] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000011 2018/04/05 10:22:49 executing program 6 (fault-call:4 fault-nth:18): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:49 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:49 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000000c0)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000140)={r0}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:49 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x2c) 2018/04/05 10:22:49 executing program 2: socketpair(0x15, 0x5, 0x800001a2, &(0x7f00000001c0)) [ 426.124924] FAULT_INJECTION: forcing a failure. [ 426.124924] name failslab, interval 1, probability 0, space 0, times 0 [ 426.136244] CPU: 1 PID: 30797 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 426.143098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.152455] Call Trace: [ 426.155056] dump_stack+0x1b9/0x29f [ 426.158699] ? arch_local_irq_restore+0x52/0x52 [ 426.163379] ? __save_stack_trace+0x7e/0xd0 [ 426.167723] should_fail.cold.4+0xa/0x1a [ 426.171829] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 426.176939] ? kasan_kmalloc+0xc4/0xe0 [ 426.180835] ? kmem_cache_alloc_trace+0x152/0x780 [ 426.185685] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 426.190883] ? __list_lru_init+0x45e/0x7b0 [ 426.195125] ? sget_userns+0x6d9/0xf20 [ 426.199017] ? mount_ns+0x8f/0x1d0 [ 426.202569] ? graph_lock+0x170/0x170 [ 426.206377] ? do_mount+0x564/0x3070 [ 426.210099] ? ksys_mount+0x12d/0x140 [ 426.213907] ? SyS_mount+0x35/0x50 [ 426.217541] ? do_syscall_64+0x29e/0x9d0 [ 426.221618] ? find_held_lock+0x36/0x1c0 [ 426.225700] ? __lock_is_held+0xb5/0x140 [ 426.229789] ? check_same_owner+0x320/0x320 [ 426.234469] ? rcu_note_context_switch+0x710/0x710 [ 426.239416] should_failslab+0x124/0x180 [ 426.243494] kmem_cache_alloc_trace+0x2cb/0x780 [ 426.248189] ? __kmalloc_node+0x33/0x70 [ 426.252171] ? __kmalloc_node+0x33/0x70 [ 426.256157] ? rcu_read_lock_sched_held+0x108/0x120 [ 426.261189] __memcg_init_list_lru_node+0x17c/0x2c0 [ 426.266215] ? list_lru_add+0x850/0x850 [ 426.270198] ? __kmalloc_node+0x47/0x70 [ 426.274189] __list_lru_init+0x45e/0x7b0 [ 426.278261] ? list_lru_destroy+0x4c0/0x4c0 [ 426.282589] ? __raw_spin_lock_init+0x1c/0x100 [ 426.287183] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 426.292206] ? __lockdep_init_map+0x105/0x590 [ 426.296710] ? lockdep_init_map+0x9/0x10 [ 426.300785] sget_userns+0x6d9/0xf20 [ 426.304501] ? set_anon_super+0x20/0x20 [ 426.308843] ? get_empty_filp.cold.7+0x3e/0x3e [ 426.313433] ? destroy_unused_super.part.9+0x100/0x100 [ 426.318722] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 426.323749] ? kasan_check_read+0x11/0x20 [ 426.327907] ? rcu_pm_notify+0xc0/0xc0 [ 426.331798] ? trace_hardirqs_off+0xd/0x10 [ 426.336048] ? cap_capable+0x1f9/0x260 [ 426.340207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.345751] ? security_capable+0xa4/0xd0 [ 426.349911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.355452] ? ns_capable_common+0x13f/0x170 [ 426.359874] mount_ns+0x8f/0x1d0 [ 426.363244] ? rpc_pipe_release+0xb70/0xb70 [ 426.367571] rpc_mount+0x9e/0xd0 [ 426.370945] mount_fs+0xae/0x328 [ 426.374325] vfs_kern_mount.part.34+0xd4/0x4d0 [ 426.378913] ? may_umount+0xb0/0xb0 [ 426.382547] ? _raw_read_unlock+0x22/0x30 [ 426.386701] ? __get_fs_type+0x97/0xc0 [ 426.390598] do_mount+0x564/0x3070 [ 426.394150] ? copy_mount_string+0x40/0x40 [ 426.398405] ? rcu_pm_notify+0xc0/0xc0 [ 426.402305] ? copy_mount_options+0x5f/0x380 [ 426.406725] ? rcu_read_lock_sched_held+0x108/0x120 [ 426.411747] ? kmem_cache_alloc_trace+0x616/0x780 [ 426.416607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.422147] ? copy_mount_options+0x285/0x380 [ 426.426657] ksys_mount+0x12d/0x140 [ 426.430298] SyS_mount+0x35/0x50 [ 426.433673] ? ksys_mount+0x140/0x140 [ 426.437482] do_syscall_64+0x29e/0x9d0 [ 426.441370] ? vmalloc_sync_all+0x30/0x30 [ 426.445526] ? _raw_spin_unlock_irq+0x27/0x70 [ 426.450035] ? finish_task_switch+0x1ca/0x820 [ 426.454557] ? syscall_return_slowpath+0x5c0/0x5c0 [ 426.459503] ? syscall_return_slowpath+0x30f/0x5c0 [ 426.464445] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 426.469822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 426.474683] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 426.479878] RIP: 0033:0x4552d9 [ 426.483069] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 426.490784] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 426.498060] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 426.505337] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 426.512611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/05 10:22:49 executing program 2: socketpair(0x15, 0x5, 0x80000d00, &(0x7f00000001c0)) 2018/04/05 10:22:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:49 executing program 2: socketpair(0x15, 0x5, 0x8000f100, &(0x7f00000001c0)) 2018/04/05 10:22:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:49 executing program 2: socketpair(0x15, 0x5, 0x80003301, &(0x7f00000001c0)) 2018/04/05 10:22:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:49 executing program 2: socketpair(0x15, 0x5, 0x80000161, &(0x7f00000001c0)) 2018/04/05 10:22:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair$inet(0x2, 0x5, 0x100, &(0x7f0000000000)) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) [ 426.519888] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000012 2018/04/05 10:22:50 executing program 6 (fault-call:4 fault-nth:19): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r2, &(0x7f0000002240)={&(0x7f0000000b00)=@hci, 0x80, &(0x7f0000002100)=[{&(0x7f0000000b80)=""/133, 0x85}, {&(0x7f0000000c40)=""/159, 0x9f}, {&(0x7f0000000d00)=""/196, 0xc4}, {&(0x7f0000000e00)=""/190, 0xbe}, {&(0x7f0000000ec0)=""/4096, 0x1000}, {&(0x7f0000001ec0)=""/84, 0x54}, {&(0x7f0000001f40)=""/246, 0xf6}, {&(0x7f0000002040)=""/132, 0x84}], 0x8, &(0x7f0000002180)=""/185, 0xb9, 0x3}, 0x1) 2018/04/05 10:22:50 executing program 2: socketpair(0x15, 0x5, 0x80000105, &(0x7f00000001c0)) 2018/04/05 10:22:50 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530f5", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:50 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0t', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:50 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x2c) 2018/04/05 10:22:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:50 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x2c) [ 427.208996] FAULT_INJECTION: forcing a failure. [ 427.208996] name failslab, interval 1, probability 0, space 0, times 0 [ 427.220318] CPU: 1 PID: 30858 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 427.227162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.236607] Call Trace: [ 427.239209] dump_stack+0x1b9/0x29f [ 427.242940] ? arch_local_irq_restore+0x52/0x52 [ 427.247628] ? __save_stack_trace+0x7e/0xd0 [ 427.251973] should_fail.cold.4+0xa/0x1a 2018/04/05 10:22:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:50 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x2c) [ 427.256057] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 427.261174] ? kasan_kmalloc+0xc4/0xe0 [ 427.265676] ? kmem_cache_alloc_trace+0x152/0x780 [ 427.270525] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 427.275723] ? __list_lru_init+0x45e/0x7b0 [ 427.279975] ? sget_userns+0x6d9/0xf20 [ 427.283868] ? mount_ns+0x8f/0x1d0 [ 427.287422] ? graph_lock+0x170/0x170 [ 427.291235] ? do_mount+0x564/0x3070 [ 427.294970] ? ksys_mount+0x12d/0x140 [ 427.298778] ? SyS_mount+0x35/0x50 [ 427.302325] ? do_syscall_64+0x29e/0x9d0 2018/04/05 10:22:50 executing program 2: socketpair(0x15, 0x5, 0x800000c8, &(0x7f00000001c0)) 2018/04/05 10:22:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 427.306404] ? find_held_lock+0x36/0x1c0 [ 427.310483] ? __lock_is_held+0xb5/0x140 [ 427.314563] ? check_same_owner+0x320/0x320 [ 427.318896] ? rcu_note_context_switch+0x710/0x710 [ 427.323842] should_failslab+0x124/0x180 [ 427.327917] kmem_cache_alloc_trace+0x2cb/0x780 [ 427.332601] ? __kmalloc_node+0x33/0x70 [ 427.336581] ? __kmalloc_node+0x33/0x70 [ 427.340565] ? rcu_read_lock_sched_held+0x108/0x120 [ 427.345614] __memcg_init_list_lru_node+0x17c/0x2c0 [ 427.350640] ? list_lru_add+0x850/0x850 [ 427.354631] ? __kmalloc_node+0x47/0x70 [ 427.358623] __list_lru_init+0x45e/0x7b0 [ 427.362697] ? list_lru_destroy+0x4c0/0x4c0 [ 427.367031] ? __raw_spin_lock_init+0x1c/0x100 [ 427.371653] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 427.376682] ? __lockdep_init_map+0x105/0x590 [ 427.381185] ? lockdep_init_map+0x9/0x10 [ 427.385253] sget_userns+0x6d9/0xf20 [ 427.388969] ? set_anon_super+0x20/0x20 [ 427.392955] ? get_empty_filp.cold.7+0x3e/0x3e [ 427.397542] ? destroy_unused_super.part.9+0x100/0x100 [ 427.402831] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 2018/04/05 10:22:50 executing program 2: socketpair(0x15, 0x5, 0x80000d01, &(0x7f00000001c0)) 2018/04/05 10:22:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 427.407857] ? kasan_check_read+0x11/0x20 [ 427.412015] ? rcu_pm_notify+0xc0/0xc0 [ 427.415909] ? trace_hardirqs_off+0xd/0x10 [ 427.420154] ? cap_capable+0x1f9/0x260 [ 427.424050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.429591] ? security_capable+0xa4/0xd0 [ 427.433748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.439296] ? ns_capable_common+0x13f/0x170 [ 427.443716] mount_ns+0x8f/0x1d0 [ 427.447089] ? rpc_pipe_release+0xb70/0xb70 [ 427.451422] rpc_mount+0x9e/0xd0 [ 427.454796] mount_fs+0xae/0x328 2018/04/05 10:22:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 427.458175] vfs_kern_mount.part.34+0xd4/0x4d0 [ 427.462763] ? may_umount+0xb0/0xb0 [ 427.466395] ? _raw_read_unlock+0x22/0x30 [ 427.470544] ? __get_fs_type+0x97/0xc0 [ 427.474441] do_mount+0x564/0x3070 [ 427.477985] ? do_raw_spin_unlock+0x9e/0x2e0 [ 427.482405] ? copy_mount_string+0x40/0x40 [ 427.486646] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 427.491671] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 427.496438] ? retint_kernel+0x10/0x10 [ 427.500349] ? copy_mount_options+0x1a1/0x380 [ 427.504849] ? copy_mount_options+0x1c4/0x380 [ 427.509359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.514905] ? copy_mount_options+0x285/0x380 [ 427.519419] ksys_mount+0x12d/0x140 [ 427.523055] SyS_mount+0x35/0x50 [ 427.526426] ? ksys_mount+0x140/0x140 [ 427.530233] do_syscall_64+0x29e/0x9d0 [ 427.534129] ? vmalloc_sync_all+0x30/0x30 [ 427.538283] ? _raw_spin_unlock_irq+0x27/0x70 [ 427.542788] ? finish_task_switch+0x1ca/0x820 [ 427.547292] ? syscall_return_slowpath+0x5c0/0x5c0 [ 427.552230] ? syscall_return_slowpath+0x30f/0x5c0 [ 427.557177] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 427.562551] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 427.567407] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 427.572595] RIP: 0033:0x4552d9 [ 427.575784] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 427.583501] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 427.590776] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 427.598064] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 427.605598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 427.612875] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000013 2018/04/05 10:22:51 executing program 6 (fault-call:4 fault-nth:20): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r0) socketpair(0x9, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0xa2, 0xfd, 0xec, 0x0, 0x0, 0x2, 0x0, 0x4, 0x4, 0x2, 0x5, 0x3, 0x3, 0x1000, 0x5, 0x8001, 0x800, 0x8, 0x4, 0x4, 0x1, 0xdf0, 0x5, 0x9, 0xe7f, 0x1, 0x8, 0x100000000, 0x2, 0x400, 0x1, 0x1, 0x100, 0x0, 0x1000, 0x2, 0x0, 0x4, 0x4, @perf_config_ext={0x7fff, 0x10000}, 0x1000, 0x5da2, 0xb534, 0x5, 0x709, 0x800, 0x4}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x8) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000040)={r1}) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000640)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000000b40)=@can, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000700)=""/181, 0xb5}, {&(0x7f0000000900)=""/227, 0x468}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000a40)=""/71, 0x47}], 0x2a1, &(0x7f0000000bc0)=""/93, 0x5d}, 0xfffffffe) recvmsg$kcm(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000140)=""/110, 0x6e}, {&(0x7f00000001c0)=""/128, 0x80}, {&(0x7f0000000280)=""/146, 0x92}, {&(0x7f0000000340)=""/44, 0x2c}, {&(0x7f0000000380)=""/194, 0xc2}], 0x5, &(0x7f0000000500)=""/169, 0xa9, 0x2}, 0x10043) 2018/04/05 10:22:51 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653081", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:51 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:51 executing program 2: socketpair(0x15, 0x5, 0x8000001d, &(0x7f00000001c0)) 2018/04/05 10:22:51 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x2c) [ 428.301708] FAULT_INJECTION: forcing a failure. [ 428.301708] name failslab, interval 1, probability 0, space 0, times 0 [ 428.313095] CPU: 0 PID: 30913 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 428.319947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.329318] Call Trace: [ 428.331917] dump_stack+0x1b9/0x29f [ 428.335558] ? arch_local_irq_restore+0x52/0x52 [ 428.340240] ? perf_trace_lock+0x900/0x900 [ 428.344485] ? mutex_trylock+0x2a0/0x2a0 [ 428.348560] should_fail.cold.4+0xa/0x1a [ 428.352636] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 428.357755] ? print_usage_bug+0xc0/0xc0 [ 428.361833] ? graph_lock+0x170/0x170 [ 428.365643] ? lock_downgrade+0x8e0/0x8e0 [ 428.369805] ? find_held_lock+0x36/0x1c0 [ 428.373882] ? __lock_is_held+0xb5/0x140 [ 428.377968] ? check_same_owner+0x320/0x320 [ 428.382296] ? __might_sleep+0x95/0x190 [ 428.386281] ? rcu_note_context_switch+0x710/0x710 [ 428.391229] should_failslab+0x124/0x180 [ 428.395301] __kmalloc+0x2c8/0x760 [ 428.398859] ? __kmalloc_node+0x47/0x70 [ 428.402839] ? __list_lru_init+0xcf/0x7b0 [ 428.407006] __list_lru_init+0xcf/0x7b0 [ 428.410992] ? list_lru_destroy+0x4c0/0x4c0 [ 428.415322] ? __raw_spin_lock_init+0x1c/0x100 [ 428.419926] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 428.424963] ? lockdep_init_map+0x9/0x10 [ 428.429042] sget_userns+0x706/0xf20 [ 428.432761] ? set_anon_super+0x20/0x20 [ 428.436749] ? get_empty_filp.cold.7+0x3e/0x3e [ 428.441342] ? destroy_unused_super.part.9+0x100/0x100 [ 428.446653] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 428.451690] ? kasan_check_read+0x11/0x20 [ 428.455856] ? rcu_pm_notify+0xc0/0xc0 [ 428.459767] ? trace_hardirqs_off+0xd/0x10 [ 428.464012] ? cap_capable+0x1f9/0x260 [ 428.467921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.473472] ? security_capable+0xa4/0xd0 [ 428.477633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.483187] ? ns_capable_common+0x13f/0x170 [ 428.487618] mount_ns+0x8f/0x1d0 [ 428.490996] ? rpc_pipe_release+0xb70/0xb70 [ 428.495330] rpc_mount+0x9e/0xd0 [ 428.498714] mount_fs+0xae/0x328 [ 428.502099] vfs_kern_mount.part.34+0xd4/0x4d0 [ 428.506698] ? may_umount+0xb0/0xb0 [ 428.510329] ? _raw_read_unlock+0x22/0x30 [ 428.514489] ? __get_fs_type+0x97/0xc0 [ 428.518391] do_mount+0x564/0x3070 [ 428.521942] ? copy_mount_string+0x40/0x40 [ 428.526185] ? rcu_pm_notify+0xc0/0xc0 [ 428.530090] ? copy_mount_options+0x5f/0x380 [ 428.534510] ? rcu_read_lock_sched_held+0x108/0x120 [ 428.539536] ? kmem_cache_alloc_trace+0x616/0x780 [ 428.544393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 428.549946] ? _copy_from_user+0xdf/0x150 [ 428.554110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.559746] ? copy_mount_options+0x285/0x380 [ 428.564261] ksys_mount+0x12d/0x140 [ 428.567904] SyS_mount+0x35/0x50 [ 428.571282] ? ksys_mount+0x140/0x140 [ 428.575095] do_syscall_64+0x29e/0x9d0 [ 428.578991] ? vmalloc_sync_all+0x30/0x30 [ 428.583151] ? _raw_spin_unlock_irq+0x27/0x70 [ 428.587655] ? finish_task_switch+0x1ca/0x820 [ 428.592170] ? syscall_return_slowpath+0x5c0/0x5c0 [ 428.597114] ? syscall_return_slowpath+0x30f/0x5c0 [ 428.602058] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 428.607433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.612297] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 428.617489] RIP: 0033:0x4552d9 [ 428.620687] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 428.628406] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 428.635683] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 428.642960] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/04/05 10:22:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:51 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x2c) 2018/04/05 10:22:51 executing program 2: socketpair(0x15, 0x5, 0x80000132, &(0x7f00000001c0)) 2018/04/05 10:22:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:52 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x2c) 2018/04/05 10:22:52 executing program 2: socketpair(0x15, 0x5, 0x80000180, &(0x7f00000001c0)) 2018/04/05 10:22:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:52 executing program 2: socketpair(0x15, 0x5, 0x80006a00, &(0x7f00000001c0)) [ 428.650326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 428.657616] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000014 2018/04/05 10:22:52 executing program 6 (fault-call:4 fault-nth:21): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:52 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:52 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:52 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x2c) 2018/04/05 10:22:52 executing program 2: socketpair(0x15, 0x5, 0x8000004b, &(0x7f00000001c0)) 2018/04/05 10:22:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000000580)=@can, 0xfffffca5, &(0x7f0000000500), 0x1f0, &(0x7f00000000c0)=""/93, 0xfffffffffffffd8f}, 0x2001) [ 429.447409] FAULT_INJECTION: forcing a failure. [ 429.447409] name failslab, interval 1, probability 0, space 0, times 0 [ 429.458723] CPU: 0 PID: 30966 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 429.465568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.474924] Call Trace: [ 429.477524] dump_stack+0x1b9/0x29f [ 429.481691] ? arch_local_irq_restore+0x52/0x52 [ 429.486377] ? kernel_text_address+0x79/0xf0 [ 429.490800] ? __unwind_start+0x166/0x330 2018/04/05 10:22:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 429.494971] should_fail.cold.4+0xa/0x1a [ 429.499049] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 429.504172] ? graph_lock+0x170/0x170 [ 429.507986] ? save_stack+0x43/0xd0 [ 429.511621] ? kasan_kmalloc+0xc4/0xe0 [ 429.515519] ? __list_lru_init+0xcf/0x7b0 [ 429.519680] ? find_held_lock+0x36/0x1c0 [ 429.523757] ? __lock_is_held+0xb5/0x140 [ 429.527843] ? check_same_owner+0x320/0x320 [ 429.532180] ? rcu_note_context_switch+0x710/0x710 [ 429.537129] should_failslab+0x124/0x180 [ 429.541207] kmem_cache_alloc_node_trace+0x26f/0x770 2018/04/05 10:22:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:53 executing program 2: socketpair(0x15, 0x5, 0x8000010b, &(0x7f00000001c0)) [ 429.546320] ? mark_held_locks+0xc9/0x160 [ 429.550483] ? __raw_spin_lock_init+0x1c/0x100 [ 429.555080] __kmalloc_node+0x33/0x70 [ 429.558889] kvmalloc_node+0x6b/0x100 [ 429.562701] __list_lru_init+0x50e/0x7b0 [ 429.566776] ? list_lru_destroy+0x4c0/0x4c0 [ 429.571104] ? __raw_spin_lock_init+0x1c/0x100 [ 429.575703] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 429.580741] ? lockdep_init_map+0x9/0x10 [ 429.584816] sget_userns+0x706/0xf20 [ 429.588536] ? set_anon_super+0x20/0x20 [ 429.592524] ? get_empty_filp.cold.7+0x3e/0x3e 2018/04/05 10:22:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 429.597121] ? destroy_unused_super.part.9+0x100/0x100 [ 429.602420] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 429.607456] ? kasan_check_read+0x11/0x20 [ 429.611624] ? rcu_pm_notify+0xc0/0xc0 [ 429.615518] ? trace_hardirqs_off+0xd/0x10 [ 429.619763] ? cap_capable+0x1f9/0x260 [ 429.623665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.629207] ? security_capable+0xa4/0xd0 [ 429.633367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.638914] ? ns_capable_common+0x13f/0x170 [ 429.643339] mount_ns+0x8f/0x1d0 2018/04/05 10:22:53 executing program 2: socketpair(0x15, 0x5, 0x80008b00, &(0x7f00000001c0)) [ 429.646712] ? rpc_pipe_release+0xb70/0xb70 [ 429.651041] rpc_mount+0x9e/0xd0 [ 429.654422] mount_fs+0xae/0x328 [ 429.657802] vfs_kern_mount.part.34+0xd4/0x4d0 [ 429.662400] ? may_umount+0xb0/0xb0 [ 429.666034] ? _raw_read_unlock+0x22/0x30 [ 429.670190] ? __get_fs_type+0x97/0xc0 [ 429.674094] do_mount+0x564/0x3070 [ 429.677656] ? copy_mount_string+0x40/0x40 [ 429.681906] ? rcu_pm_notify+0xc0/0xc0 [ 429.685808] ? copy_mount_options+0x5f/0x380 [ 429.690228] ? rcu_read_lock_sched_held+0x108/0x120 2018/04/05 10:22:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:53 executing program 2: socketpair(0x15, 0x5, 0x8000a800, &(0x7f00000001c0)) [ 429.695266] ? kmem_cache_alloc_trace+0x616/0x780 [ 429.700119] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 429.705663] ? _copy_from_user+0xdf/0x150 [ 429.709819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.715362] ? copy_mount_options+0x285/0x380 [ 429.719870] ksys_mount+0x12d/0x140 [ 429.723505] SyS_mount+0x35/0x50 [ 429.726877] ? ksys_mount+0x140/0x140 [ 429.730689] do_syscall_64+0x29e/0x9d0 [ 429.734581] ? vmalloc_sync_all+0x30/0x30 [ 429.738738] ? _raw_spin_unlock_irq+0x27/0x70 [ 429.743247] ? finish_task_switch+0x1ca/0x820 [ 429.747754] ? syscall_return_slowpath+0x5c0/0x5c0 [ 429.752695] ? syscall_return_slowpath+0x30f/0x5c0 [ 429.757638] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 429.763015] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.767878] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 429.773075] RIP: 0033:0x4552d9 [ 429.776261] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 429.783980] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 429.791255] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/04/05 10:22:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 429.798524] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 429.805795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 429.813068] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000015 2018/04/05 10:22:53 executing program 6 (fault-call:4 fault-nth:22): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:53 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653002", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:53 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:53 executing program 2: socketpair(0x15, 0x5, 0x80007200, &(0x7f00000001c0)) 2018/04/05 10:22:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r0}) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:53 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x2c) 2018/04/05 10:22:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8cffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf6ffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 430.556783] FAULT_INJECTION: forcing a failure. [ 430.556783] name failslab, interval 1, probability 0, space 0, times 0 [ 430.568130] CPU: 1 PID: 31019 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 430.574976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.584341] Call Trace: [ 430.586947] dump_stack+0x1b9/0x29f [ 430.590597] ? arch_local_irq_restore+0x52/0x52 [ 430.595291] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 430.600503] should_fail.cold.4+0xa/0x1a 2018/04/05 10:22:54 executing program 2: socketpair(0x15, 0x5, 0x800000f1, &(0x7f00000001c0)) 2018/04/05 10:22:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 430.604581] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 430.609710] ? unwind_get_return_address+0x61/0xa0 [ 430.614658] ? __save_stack_trace+0x7e/0xd0 [ 430.619004] ? graph_lock+0x170/0x170 [ 430.622830] ? find_held_lock+0x36/0x1c0 [ 430.626908] ? __lock_is_held+0xb5/0x140 [ 430.631002] ? check_same_owner+0x320/0x320 [ 430.635379] ? rcu_note_context_switch+0x710/0x710 [ 430.640324] should_failslab+0x124/0x180 [ 430.644400] kmem_cache_alloc_trace+0x2cb/0x780 [ 430.649080] ? __kmalloc_node+0x33/0x70 [ 430.653062] ? __kmalloc_node+0x33/0x70 2018/04/05 10:22:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 430.657049] ? rcu_read_lock_sched_held+0x108/0x120 [ 430.662085] __memcg_init_list_lru_node+0x17c/0x2c0 [ 430.667120] ? list_lru_add+0x850/0x850 [ 430.671198] ? __kmalloc_node+0x47/0x70 [ 430.675189] __list_lru_init+0x45e/0x7b0 [ 430.679278] ? list_lru_destroy+0x4c0/0x4c0 [ 430.683612] ? __raw_spin_lock_init+0x1c/0x100 [ 430.688278] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 430.693315] ? lockdep_init_map+0x9/0x10 [ 430.697391] sget_userns+0x706/0xf20 [ 430.701127] ? set_anon_super+0x20/0x20 2018/04/05 10:22:54 executing program 2: socketpair(0x15, 0x5, 0x80001800, &(0x7f00000001c0)) [ 430.705128] ? get_empty_filp.cold.7+0x3e/0x3e [ 430.709725] ? destroy_unused_super.part.9+0x100/0x100 [ 430.715026] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 430.720213] ? kasan_check_read+0x11/0x20 [ 430.724377] ? rcu_pm_notify+0xc0/0xc0 [ 430.728275] ? trace_hardirqs_off+0xd/0x10 [ 430.732522] ? cap_capable+0x1f9/0x260 [ 430.736421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.741969] ? security_capable+0xa4/0xd0 [ 430.746127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.751678] ? ns_capable_common+0x13f/0x170 2018/04/05 10:22:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 430.756103] mount_ns+0x8f/0x1d0 [ 430.759474] ? rpc_pipe_release+0xb70/0xb70 [ 430.763804] rpc_mount+0x9e/0xd0 [ 430.767176] mount_fs+0xae/0x328 [ 430.770554] vfs_kern_mount.part.34+0xd4/0x4d0 [ 430.775146] ? may_umount+0xb0/0xb0 [ 430.778783] ? _raw_read_unlock+0x22/0x30 [ 430.782939] ? __get_fs_type+0x97/0xc0 [ 430.786836] do_mount+0x564/0x3070 [ 430.790385] ? copy_mount_string+0x40/0x40 [ 430.794639] ? rcu_pm_notify+0xc0/0xc0 [ 430.798548] ? copy_mount_options+0x5f/0x380 [ 430.802964] ? rcu_read_lock_sched_held+0x108/0x120 2018/04/05 10:22:54 executing program 2: socketpair(0x15, 0x5, 0x8000a101, &(0x7f00000001c0)) [ 430.808004] ? kmem_cache_alloc_trace+0x616/0x780 [ 430.812865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.818411] ? copy_mount_options+0x285/0x380 [ 430.822923] ksys_mount+0x12d/0x140 [ 430.826563] SyS_mount+0x35/0x50 [ 430.829939] ? ksys_mount+0x140/0x140 [ 430.833748] do_syscall_64+0x29e/0x9d0 [ 430.837638] ? vmalloc_sync_all+0x30/0x30 [ 430.841798] ? _raw_spin_unlock_irq+0x27/0x70 [ 430.846299] ? finish_task_switch+0x1ca/0x820 [ 430.850800] ? syscall_return_slowpath+0x5c0/0x5c0 [ 430.855740] ? syscall_return_slowpath+0x30f/0x5c0 [ 430.860688] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 430.866062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.870924] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 430.876118] RIP: 0033:0x4552d9 [ 430.879306] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 430.887026] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 430.894302] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 430.901576] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 430.908851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 430.916129] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000016 2018/04/05 10:22:55 executing program 6 (fault-call:4 fault-nth:23): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:55 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:55 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:55 executing program 2: socketpair(0x15, 0x5, 0x8000b800, &(0x7f00000001c0)) 2018/04/05 10:22:55 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x2c) 2018/04/05 10:22:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0xf, 0x10}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) [ 432.005851] FAULT_INJECTION: forcing a failure. [ 432.005851] name failslab, interval 1, probability 0, space 0, times 0 [ 432.017206] CPU: 0 PID: 31070 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 432.024053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.033406] Call Trace: [ 432.036005] dump_stack+0x1b9/0x29f [ 432.039647] ? arch_local_irq_restore+0x52/0x52 [ 432.044329] ? __save_stack_trace+0x7e/0xd0 [ 432.048672] should_fail.cold.4+0xa/0x1a [ 432.052743] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 432.057849] ? kasan_kmalloc+0xc4/0xe0 [ 432.061742] ? kmem_cache_alloc_trace+0x152/0x780 [ 432.066593] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 432.071788] ? __list_lru_init+0x45e/0x7b0 [ 432.076037] ? sget_userns+0x706/0xf20 [ 432.079933] ? mount_ns+0x8f/0x1d0 [ 432.083480] ? graph_lock+0x170/0x170 [ 432.087284] ? do_mount+0x564/0x3070 [ 432.091002] ? ksys_mount+0x12d/0x140 [ 432.094816] ? SyS_mount+0x35/0x50 [ 432.098374] ? do_syscall_64+0x29e/0x9d0 [ 432.102451] ? find_held_lock+0x36/0x1c0 [ 432.106530] ? __lock_is_held+0xb5/0x140 [ 432.110612] ? check_same_owner+0x320/0x320 [ 432.114943] ? rcu_note_context_switch+0x710/0x710 [ 432.119891] should_failslab+0x124/0x180 [ 432.123963] kmem_cache_alloc_trace+0x2cb/0x780 [ 432.128640] ? __kmalloc_node+0x33/0x70 [ 432.132622] ? __kmalloc_node+0x33/0x70 [ 432.136605] ? rcu_read_lock_sched_held+0x108/0x120 [ 432.141639] __memcg_init_list_lru_node+0x17c/0x2c0 [ 432.146668] ? list_lru_add+0x850/0x850 [ 432.150639] ? __kmalloc_node+0x47/0x70 [ 432.154612] __list_lru_init+0x45e/0x7b0 [ 432.158663] ? list_lru_destroy+0x4c0/0x4c0 [ 432.162977] ? __raw_spin_lock_init+0x1c/0x100 [ 432.167549] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 432.172557] ? lockdep_init_map+0x9/0x10 [ 432.176631] sget_userns+0x706/0xf20 [ 432.180327] ? set_anon_super+0x20/0x20 [ 432.184291] ? get_empty_filp.cold.7+0x3e/0x3e [ 432.188862] ? destroy_unused_super.part.9+0x100/0x100 [ 432.194128] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 432.199132] ? kasan_check_read+0x11/0x20 [ 432.203269] ? rcu_pm_notify+0xc0/0xc0 [ 432.207139] ? trace_hardirqs_off+0xd/0x10 [ 432.211359] ? cap_capable+0x1f9/0x260 [ 432.215233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.220755] ? security_capable+0xa4/0xd0 [ 432.224891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.230412] ? ns_capable_common+0x13f/0x170 [ 432.234810] mount_ns+0x8f/0x1d0 [ 432.238162] ? rpc_pipe_release+0xb70/0xb70 [ 432.242467] rpc_mount+0x9e/0xd0 [ 432.245821] mount_fs+0xae/0x328 [ 432.249177] vfs_kern_mount.part.34+0xd4/0x4d0 [ 432.253746] ? may_umount+0xb0/0xb0 [ 432.257355] ? _raw_read_unlock+0x22/0x30 [ 432.261486] ? __get_fs_type+0x97/0xc0 [ 432.265363] do_mount+0x564/0x3070 [ 432.268893] ? copy_mount_string+0x40/0x40 [ 432.273112] ? rcu_pm_notify+0xc0/0xc0 [ 432.276987] ? copy_mount_options+0x5f/0x380 [ 432.281383] ? rcu_read_lock_sched_held+0x108/0x120 [ 432.286385] ? kmem_cache_alloc_trace+0x616/0x780 [ 432.291215] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 432.296738] ? _copy_from_user+0xdf/0x150 [ 432.300873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.306394] ? copy_mount_options+0x285/0x380 [ 432.311223] ksys_mount+0x12d/0x140 [ 432.314837] SyS_mount+0x35/0x50 [ 432.318185] ? ksys_mount+0x140/0x140 [ 432.321971] do_syscall_64+0x29e/0x9d0 [ 432.325840] ? vmalloc_sync_all+0x30/0x30 [ 432.329971] ? _raw_spin_unlock_irq+0x27/0x70 [ 432.334449] ? finish_task_switch+0x1ca/0x820 [ 432.338926] ? syscall_return_slowpath+0x5c0/0x5c0 [ 432.343841] ? syscall_return_slowpath+0x30f/0x5c0 [ 432.348758] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 432.354110] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.358940] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 432.364112] RIP: 0033:0x4552d9 [ 432.367293] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 432.374985] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 432.382241] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 432.389491] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 432.396743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/05 10:22:55 executing program 2: socketpair(0x15, 0x5, 0x80006600, &(0x7f00000001c0)) 2018/04/05 10:22:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r2, &(0x7f0000000100)="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"}, 0x10) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="f50000000000000000000000028000006a0a00ffffffffff6910a8"], &(0x7f0000000640)="47504c00bc3047629662c71f3f5f26c0b48bec3e7ba6eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x7, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000280)) 2018/04/05 10:22:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:55 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x2c) [ 432.403995] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000017 2018/04/05 10:22:55 executing program 2: socketpair(0x15, 0x5, 0x8000f601, &(0x7f00000001c0)) 2018/04/05 10:22:55 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x2c) 2018/04/05 10:22:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:56 executing program 6 (fault-call:4 fault-nth:24): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8cffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:56 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x2c) 2018/04/05 10:22:56 executing program 0: socketpair$unix(0x1, 0x400000003, 0x0, &(0x7f0000000240)={0x0, 0x0}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x63c, 0x10001, 0x7213, 0x1, 0xffffffffffffffff, 0x2}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7, 0x2, 0x0, 0x15, r1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f00000000c0)="9dfb803c54dc9ca8d1eff78d54ec98d11557a7a5a89ded24b5da4a7428d23abb012daed759ba5689d03876a839d943deba38b37e8435abcbf87875125961a93d8df4cb5c59a58a52bdb0578fd404701b3c8971058ea68fcdb40186a945042055e026ec23e8c392cf6e4a032f4d071c801621047a15cf4dc025fd884a50d90f34c3a2479442947b2699ef67d1acca1bf9e4ffa22d1509efe588923e57d7b4287765ab49744fc8b91113a31b96689c5a580b07f1a7d668bec35ec3d3804a9a824ce5351c420cfc6f306f2596", &(0x7f0000000280)=""/4096}, 0x18) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001280)={0x1, 0x1, 0x4, 0x80000001, 0x1, r1, 0x1000000000000}, 0x2c) 2018/04/05 10:22:56 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:56 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:56 executing program 2: socketpair(0x15, 0x5, 0x800000a7, &(0x7f00000001c0)) 2018/04/05 10:22:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:56 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x2c) 2018/04/05 10:22:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:56 executing program 2: socketpair(0x15, 0x5, 0x800000e8, &(0x7f00000001c0)) 2018/04/05 10:22:56 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0x2c) [ 433.161463] FAULT_INJECTION: forcing a failure. [ 433.161463] name failslab, interval 1, probability 0, space 0, times 0 [ 433.172784] CPU: 0 PID: 31125 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 433.179630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.188988] Call Trace: [ 433.191590] dump_stack+0x1b9/0x29f [ 433.195229] ? arch_local_irq_restore+0x52/0x52 [ 433.199907] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 433.205117] should_fail.cold.4+0xa/0x1a 2018/04/05 10:22:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:56 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) [ 433.209190] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 433.214303] ? unwind_get_return_address+0x61/0xa0 [ 433.219243] ? __save_stack_trace+0x7e/0xd0 [ 433.223574] ? graph_lock+0x170/0x170 [ 433.227396] ? find_held_lock+0x36/0x1c0 [ 433.231470] ? __lock_is_held+0xb5/0x140 [ 433.235551] ? check_same_owner+0x320/0x320 [ 433.239881] ? rcu_note_context_switch+0x710/0x710 [ 433.244824] should_failslab+0x124/0x180 [ 433.248894] kmem_cache_alloc_trace+0x2cb/0x780 [ 433.253571] ? __kmalloc_node+0x33/0x70 [ 433.257551] ? __kmalloc_node+0x33/0x70 2018/04/05 10:22:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 433.261535] ? rcu_read_lock_sched_held+0x108/0x120 [ 433.266569] __memcg_init_list_lru_node+0x17c/0x2c0 [ 433.271596] ? list_lru_add+0x850/0x850 [ 433.275576] ? __kmalloc_node+0x47/0x70 [ 433.279563] __list_lru_init+0x45e/0x7b0 [ 433.283628] ? list_lru_destroy+0x4c0/0x4c0 [ 433.287960] ? __raw_spin_lock_init+0x1c/0x100 [ 433.292551] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 433.297581] ? lockdep_init_map+0x9/0x10 [ 433.301656] sget_userns+0x706/0xf20 [ 433.305374] ? set_anon_super+0x20/0x20 [ 433.309360] ? get_empty_filp.cold.7+0x3e/0x3e [ 433.313959] ? destroy_unused_super.part.9+0x100/0x100 [ 433.319255] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 433.324282] ? kasan_check_read+0x11/0x20 [ 433.328440] ? rcu_pm_notify+0xc0/0xc0 [ 433.332946] ? trace_hardirqs_off+0xd/0x10 [ 433.337187] ? cap_capable+0x1f9/0x260 [ 433.341081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.346604] ? security_capable+0xa4/0xd0 [ 433.350737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.356259] ? ns_capable_common+0x13f/0x170 [ 433.360655] mount_ns+0x8f/0x1d0 [ 433.364006] ? rpc_pipe_release+0xb70/0xb70 [ 433.368319] rpc_mount+0x9e/0xd0 [ 433.371673] mount_fs+0xae/0x328 [ 433.375038] vfs_kern_mount.part.34+0xd4/0x4d0 [ 433.379603] ? may_umount+0xb0/0xb0 [ 433.383233] ? _raw_read_unlock+0x22/0x30 [ 433.387366] ? __get_fs_type+0x97/0xc0 [ 433.391243] do_mount+0x564/0x3070 [ 433.394764] ? do_raw_spin_unlock+0x9e/0x2e0 [ 433.399154] ? copy_mount_string+0x40/0x40 [ 433.403375] ? rcu_pm_notify+0xc0/0xc0 [ 433.407251] ? copy_mount_options+0x5f/0x380 [ 433.411643] ? rcu_read_lock_sched_held+0x108/0x120 [ 433.416644] ? kmem_cache_alloc_trace+0x616/0x780 [ 433.421469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 433.426991] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.432513] ? copy_mount_options+0x285/0x380 [ 433.437006] ksys_mount+0x12d/0x140 [ 433.440626] SyS_mount+0x35/0x50 [ 433.443977] ? ksys_mount+0x140/0x140 [ 433.447760] do_syscall_64+0x29e/0x9d0 [ 433.451637] ? vmalloc_sync_all+0x30/0x30 [ 433.455769] ? kasan_check_write+0x14/0x20 [ 433.459987] ? syscall_return_slowpath+0x5c0/0x5c0 [ 433.464938] ? syscall_return_slowpath+0x30f/0x5c0 [ 433.469862] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 433.475226] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.480060] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 433.485232] RIP: 0033:0x4552d9 [ 433.488408] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 433.496122] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 433.503391] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 433.510664] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 433.517941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 433.525216] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000018 2018/04/05 10:22:57 executing program 6 (fault-call:4 fault-nth:25): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0xef5, 0xfffffffffffff801, 0x8, 0xd2a, 0x0, 0x3, 0x104, 0x1, 0x96, 0xe0, 0x81, 0x3f, 0x4, 0x6a, 0xffff, 0x5, 0x6, 0x8, 0x7fffffff, 0x400, 0x8000, 0x2, 0x75c, 0x8001, 0x100000000, 0xffffffffffff8001, 0xff, 0xfffffffffffffff8, 0x2, 0x93, 0xc6, 0xffffffff, 0xfffffffffffffff9, 0x6, 0x3, 0x2, 0x0, 0x5, 0x2, @perf_config_ext={0x522053b8, 0x100000000}, 0x40, 0x1ff, 0x8, 0x2, 0x9, 0x9, 0xff}, 0x0, 0xa, r0, 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x6) 2018/04/05 10:22:57 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:57 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0x2c) 2018/04/05 10:22:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffff8c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:57 executing program 2: socketpair(0x15, 0x5, 0x8000016f, &(0x7f00000001c0)) [ 434.168737] FAULT_INJECTION: forcing a failure. [ 434.168737] name failslab, interval 1, probability 0, space 0, times 0 [ 434.180123] CPU: 0 PID: 31170 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 434.186969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.196335] Call Trace: [ 434.198951] dump_stack+0x1b9/0x29f [ 434.202608] ? arch_local_irq_restore+0x52/0x52 [ 434.207290] ? __save_stack_trace+0x7e/0xd0 [ 434.211633] should_fail.cold.4+0xa/0x1a [ 434.215710] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 434.220820] ? kasan_kmalloc+0xc4/0xe0 [ 434.224719] ? kmem_cache_alloc_trace+0x152/0x780 [ 434.229574] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 434.234771] ? __list_lru_init+0x45e/0x7b0 [ 434.239016] ? sget_userns+0x706/0xf20 [ 434.242915] ? mount_ns+0x8f/0x1d0 [ 434.246463] ? graph_lock+0x170/0x170 [ 434.250270] ? do_mount+0x564/0x3070 [ 434.253987] ? ksys_mount+0x12d/0x140 [ 434.257796] ? SyS_mount+0x35/0x50 [ 434.261345] ? do_syscall_64+0x29e/0x9d0 [ 434.265420] ? find_held_lock+0x36/0x1c0 [ 434.269499] ? __lock_is_held+0xb5/0x140 [ 434.273581] ? check_same_owner+0x320/0x320 [ 434.277916] ? rcu_note_context_switch+0x710/0x710 [ 434.282875] should_failslab+0x124/0x180 [ 434.286956] kmem_cache_alloc_trace+0x2cb/0x780 [ 434.291639] ? __kmalloc_node+0x33/0x70 [ 434.295626] ? __kmalloc_node+0x33/0x70 [ 434.299616] ? rcu_read_lock_sched_held+0x108/0x120 [ 434.304652] __memcg_init_list_lru_node+0x17c/0x2c0 [ 434.309678] ? list_lru_add+0x850/0x850 [ 434.313659] ? __kmalloc_node+0x47/0x70 [ 434.317645] __list_lru_init+0x45e/0x7b0 [ 434.321720] ? list_lru_destroy+0x4c0/0x4c0 [ 434.326045] ? __raw_spin_lock_init+0x1c/0x100 [ 434.330645] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 434.335675] ? lockdep_init_map+0x9/0x10 [ 434.339748] sget_userns+0x706/0xf20 [ 434.343467] ? set_anon_super+0x20/0x20 [ 434.347450] ? get_empty_filp.cold.7+0x3e/0x3e [ 434.352037] ? destroy_unused_super.part.9+0x100/0x100 [ 434.357324] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 434.362354] ? kasan_check_read+0x11/0x20 [ 434.366515] ? rcu_pm_notify+0xc0/0xc0 [ 434.370405] ? trace_hardirqs_off+0xd/0x10 [ 434.374648] ? cap_capable+0x1f9/0x260 [ 434.378545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.384087] ? security_capable+0xa4/0xd0 [ 434.388247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.393795] ? ns_capable_common+0x13f/0x170 [ 434.398213] mount_ns+0x8f/0x1d0 [ 434.401586] ? rpc_pipe_release+0xb70/0xb70 [ 434.405915] rpc_mount+0x9e/0xd0 [ 434.409500] mount_fs+0xae/0x328 [ 434.412879] vfs_kern_mount.part.34+0xd4/0x4d0 [ 434.417470] ? may_umount+0xb0/0xb0 [ 434.421102] ? _raw_read_unlock+0x22/0x30 [ 434.425253] ? __get_fs_type+0x97/0xc0 [ 434.429150] do_mount+0x564/0x3070 [ 434.432701] ? copy_mount_string+0x40/0x40 [ 434.436942] ? rcu_pm_notify+0xc0/0xc0 [ 434.440853] ? copy_mount_options+0x5f/0x380 [ 434.445270] ? rcu_read_lock_sched_held+0x108/0x120 [ 434.450311] ? kmem_cache_alloc_trace+0x616/0x780 [ 434.455162] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 434.460711] ? _copy_from_user+0xdf/0x150 [ 434.464883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.470455] ? copy_mount_options+0x285/0x380 [ 434.474962] ksys_mount+0x12d/0x140 [ 434.478600] SyS_mount+0x35/0x50 [ 434.481969] ? ksys_mount+0x140/0x140 [ 434.485777] do_syscall_64+0x29e/0x9d0 [ 434.489676] ? vmalloc_sync_all+0x30/0x30 [ 434.493837] ? _raw_spin_unlock_irq+0x27/0x70 [ 434.498341] ? finish_task_switch+0x1ca/0x820 [ 434.502851] ? syscall_return_slowpath+0x5c0/0x5c0 [ 434.507788] ? syscall_return_slowpath+0x30f/0x5c0 [ 434.512737] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 434.518115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.522971] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 434.528162] RIP: 0033:0x4552d9 [ 434.531351] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 434.539065] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 434.546340] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 434.553615] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 434.560918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/05 10:22:57 executing program 2: socketpair(0x15, 0x5, 0x800000c1, &(0x7f00000001c0)) 2018/04/05 10:22:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xfffffff6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x400000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:57 executing program 2: socketpair(0x15, 0x5, 0x80000095, &(0x7f00000001c0)) 2018/04/05 10:22:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x200000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 434.568200] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000019 2018/04/05 10:22:58 executing program 6 (fault-call:4 fault-nth:26): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:58 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x2c) 2018/04/05 10:22:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:58 executing program 2: socketpair(0x15, 0x5, 0x8000016b, &(0x7f00000001c0)) 2018/04/05 10:22:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:58 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c65308c", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:22:58 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 435.236776] FAULT_INJECTION: forcing a failure. [ 435.236776] name failslab, interval 1, probability 0, space 0, times 0 [ 435.248091] CPU: 0 PID: 31217 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 435.254940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.264300] Call Trace: [ 435.266896] dump_stack+0x1b9/0x29f [ 435.270536] ? arch_local_irq_restore+0x52/0x52 [ 435.275219] ? __save_stack_trace+0x7e/0xd0 [ 435.279555] should_fail.cold.4+0xa/0x1a [ 435.283626] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 435.288733] ? kasan_kmalloc+0xc4/0xe0 [ 435.292633] ? kmem_cache_alloc_trace+0x152/0x780 [ 435.297485] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 435.302686] ? __list_lru_init+0x45e/0x7b0 [ 435.306927] ? sget_userns+0x706/0xf20 [ 435.310823] ? mount_ns+0x8f/0x1d0 [ 435.314370] ? graph_lock+0x170/0x170 [ 435.318183] ? do_mount+0x564/0x3070 [ 435.321906] ? ksys_mount+0x12d/0x140 [ 435.325715] ? SyS_mount+0x35/0x50 [ 435.329263] ? do_syscall_64+0x29e/0x9d0 [ 435.333339] ? find_held_lock+0x36/0x1c0 [ 435.337410] ? __lock_is_held+0xb5/0x140 [ 435.341491] ? check_same_owner+0x320/0x320 [ 435.345822] ? rcu_note_context_switch+0x710/0x710 [ 435.350771] should_failslab+0x124/0x180 [ 435.354846] kmem_cache_alloc_trace+0x2cb/0x780 [ 435.359527] ? __kmalloc_node+0x33/0x70 [ 435.363507] ? __kmalloc_node+0x33/0x70 [ 435.367487] ? rcu_read_lock_sched_held+0x108/0x120 [ 435.372523] __memcg_init_list_lru_node+0x17c/0x2c0 [ 435.377550] ? list_lru_add+0x850/0x850 [ 435.381547] ? __kmalloc_node+0x47/0x70 [ 435.385537] __list_lru_init+0x45e/0x7b0 [ 435.389610] ? list_lru_destroy+0x4c0/0x4c0 [ 435.393938] ? __raw_spin_lock_init+0x1c/0x100 [ 435.398537] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 435.403567] ? lockdep_init_map+0x9/0x10 [ 435.407641] sget_userns+0x706/0xf20 [ 435.411358] ? set_anon_super+0x20/0x20 [ 435.415353] ? get_empty_filp.cold.7+0x3e/0x3e [ 435.419942] ? destroy_unused_super.part.9+0x100/0x100 [ 435.425233] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 435.430257] ? kasan_check_read+0x11/0x20 [ 435.434417] ? rcu_pm_notify+0xc0/0xc0 [ 435.438308] ? trace_hardirqs_off+0xd/0x10 [ 435.442549] ? cap_capable+0x1f9/0x260 [ 435.446447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.451987] ? security_capable+0xa4/0xd0 [ 435.456144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.461689] ? ns_capable_common+0x13f/0x170 [ 435.466110] mount_ns+0x8f/0x1d0 [ 435.469483] ? rpc_pipe_release+0xb70/0xb70 [ 435.473815] rpc_mount+0x9e/0xd0 [ 435.477193] mount_fs+0xae/0x328 [ 435.480576] vfs_kern_mount.part.34+0xd4/0x4d0 [ 435.485167] ? may_umount+0xb0/0xb0 [ 435.488805] ? _raw_read_unlock+0x22/0x30 [ 435.492956] ? __get_fs_type+0x97/0xc0 [ 435.496859] do_mount+0x564/0x3070 [ 435.500406] ? do_raw_spin_unlock+0x9e/0x2e0 [ 435.504824] ? copy_mount_string+0x40/0x40 [ 435.509070] ? rcu_pm_notify+0xc0/0xc0 [ 435.512975] ? copy_mount_options+0x5f/0x380 [ 435.517392] ? rcu_read_lock_sched_held+0x108/0x120 [ 435.522417] ? kmem_cache_alloc_trace+0x616/0x780 [ 435.527269] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 435.532817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.538357] ? copy_mount_options+0x285/0x380 [ 435.542863] ksys_mount+0x12d/0x140 [ 435.546502] SyS_mount+0x35/0x50 [ 435.549873] ? ksys_mount+0x140/0x140 [ 435.554809] do_syscall_64+0x29e/0x9d0 [ 435.558698] ? vmalloc_sync_all+0x30/0x30 [ 435.562855] ? _raw_spin_unlock_irq+0x27/0x70 [ 435.567366] ? finish_task_switch+0x1ca/0x820 [ 435.571870] ? syscall_return_slowpath+0x5c0/0x5c0 [ 435.576810] ? syscall_return_slowpath+0x30f/0x5c0 [ 435.581755] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 435.587127] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 435.591987] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 435.597174] RIP: 0033:0x4552d9 [ 435.600366] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 435.608082] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 435.615351] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 435.622620] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 435.629888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/05 10:22:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf6ffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:58 executing program 2: socketpair(0x15, 0x5, 0x80000113, &(0x7f00000001c0)) 2018/04/05 10:22:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:58 executing program 2: socketpair(0x15, 0x5, 0x80002700, &(0x7f00000001c0)) 2018/04/05 10:22:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 435.637158] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000001a 2018/04/05 10:22:59 executing program 6 (fault-call:4 fault-nth:27): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:22:59 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:59 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:22:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:59 executing program 2: socketpair(0x15, 0x5, 0x80000a01, &(0x7f00000001c0)) 2018/04/05 10:22:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair(0x1, 0x1, 0xee03, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) close(r1) recvmsg(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xdca44affe26601fd, 0x2}, 0x0) 2018/04/05 10:22:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x2c) [ 436.332644] FAULT_INJECTION: forcing a failure. [ 436.332644] name failslab, interval 1, probability 0, space 0, times 0 [ 436.343935] CPU: 1 PID: 31263 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 436.350782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.360142] Call Trace: [ 436.362750] dump_stack+0x1b9/0x29f [ 436.366392] ? arch_local_irq_restore+0x52/0x52 [ 436.371075] ? __save_stack_trace+0x7e/0xd0 [ 436.375416] should_fail.cold.4+0xa/0x1a [ 436.379756] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 436.384870] ? kasan_kmalloc+0xc4/0xe0 [ 436.388769] ? kmem_cache_alloc_trace+0x152/0x780 [ 436.393617] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 436.398812] ? __list_lru_init+0x45e/0x7b0 [ 436.403059] ? sget_userns+0x706/0xf20 [ 436.406954] ? mount_ns+0x8f/0x1d0 [ 436.410502] ? graph_lock+0x170/0x170 [ 436.414306] ? do_mount+0x564/0x3070 [ 436.418025] ? ksys_mount+0x12d/0x140 [ 436.421831] ? SyS_mount+0x35/0x50 [ 436.425380] ? do_syscall_64+0x29e/0x9d0 [ 436.429452] ? find_held_lock+0x36/0x1c0 [ 436.433529] ? __lock_is_held+0xb5/0x140 [ 436.437612] ? check_same_owner+0x320/0x320 [ 436.441946] ? rcu_note_context_switch+0x710/0x710 [ 436.446961] should_failslab+0x124/0x180 [ 436.451037] kmem_cache_alloc_trace+0x2cb/0x780 [ 436.455713] ? __kmalloc_node+0x33/0x70 [ 436.459692] ? __kmalloc_node+0x33/0x70 [ 436.463677] ? rcu_read_lock_sched_held+0x108/0x120 [ 436.468708] __memcg_init_list_lru_node+0x17c/0x2c0 [ 436.473737] ? list_lru_add+0x850/0x850 [ 436.477720] ? __kmalloc_node+0x47/0x70 [ 436.481713] __list_lru_init+0x45e/0x7b0 [ 436.485785] ? list_lru_destroy+0x4c0/0x4c0 [ 436.490112] ? __raw_spin_lock_init+0x1c/0x100 [ 436.494708] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 436.499749] ? lockdep_init_map+0x9/0x10 [ 436.503823] sget_userns+0x706/0xf20 [ 436.507546] ? set_anon_super+0x20/0x20 [ 436.511535] ? get_empty_filp.cold.7+0x3e/0x3e [ 436.516128] ? destroy_unused_super.part.9+0x100/0x100 [ 436.521421] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 436.526446] ? kasan_check_read+0x11/0x20 [ 436.530605] ? rcu_pm_notify+0xc0/0xc0 [ 436.534497] ? trace_hardirqs_off+0xd/0x10 [ 436.538741] ? cap_capable+0x1f9/0x260 [ 436.542641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.548187] ? security_capable+0xa4/0xd0 [ 436.552344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.557887] ? ns_capable_common+0x13f/0x170 [ 436.562311] mount_ns+0x8f/0x1d0 [ 436.565685] ? rpc_pipe_release+0xb70/0xb70 [ 436.570016] rpc_mount+0x9e/0xd0 [ 436.573396] mount_fs+0xae/0x328 [ 436.576774] vfs_kern_mount.part.34+0xd4/0x4d0 [ 436.581366] ? may_umount+0xb0/0xb0 [ 436.585003] ? _raw_read_unlock+0x22/0x30 [ 436.589164] ? __get_fs_type+0x97/0xc0 [ 436.593061] do_mount+0x564/0x3070 [ 436.596607] ? do_raw_spin_unlock+0x9e/0x2e0 [ 436.601028] ? copy_mount_string+0x40/0x40 [ 436.605274] ? rcu_pm_notify+0xc0/0xc0 [ 436.609182] ? copy_mount_options+0x5f/0x380 [ 436.613598] ? rcu_read_lock_sched_held+0x108/0x120 [ 436.618622] ? kmem_cache_alloc_trace+0x616/0x780 [ 436.623472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 436.629021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.634570] ? copy_mount_options+0x285/0x380 [ 436.639081] ksys_mount+0x12d/0x140 [ 436.642719] SyS_mount+0x35/0x50 [ 436.646092] ? ksys_mount+0x140/0x140 [ 436.649901] do_syscall_64+0x29e/0x9d0 [ 436.653801] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 436.658652] ? syscall_return_slowpath+0x5c0/0x5c0 [ 436.663588] ? syscall_return_slowpath+0x30f/0x5c0 [ 436.668532] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 436.673907] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 436.678766] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/04/05 10:22:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) socketpair(0x1f, 0x5, 0x2, &(0x7f0000000140)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x8, 0x2, 0xf200, 0x4, 0x0, 0x7, 0x808, 0x8, 0x40, 0x8, 0x40, 0x58c, 0x1f, 0x5, 0x8, 0x101, 0x40, 0x100000001, 0x0, 0x0, 0x6, 0x9, 0x7, 0x80000000, 0xeec, 0x1, 0x2, 0x10001, 0x5, 0xcd67, 0x6, 0xcbb7, 0x9, 0x6, 0x101, 0x100000001, 0x0, 0x7, 0x2, @perf_config_ext={0xffffffffffffffc0, 0x9}, 0x100, 0x0, 0x9f8, 0x0, 0x80000001, 0x3, 0x1f}, 0xffffffffffffffff, 0xa, r2, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000280)='^!vmnet1\x00') r4 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x1f, 0xe1ba, 0x7fff, 0x0, 0x0, 0x8, 0x40000, 0x4, 0xde0, 0xbd, 0x3, 0x1ff, 0x1800000000000, 0x10001, 0x5, 0x9, 0x32, 0x3, 0x8, 0x450, 0x5bca722f, 0x4, 0x80000001, 0x6, 0xd7, 0x4, 0x5, 0x0, 0x1, 0x1, 0xc02, 0x7, 0x400, 0x7, 0x6b6d0dfd, 0x1ff, 0x0, 0xb, 0x0, @perf_config_ext={0x7, 0xffff}, 0x4000, 0x1, 0x4, 0x7, 0x200, 0x81, 0x3f}, 0x0, 0x7, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) 2018/04/05 10:22:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:22:59 executing program 2: socketpair(0x15, 0x5, 0x80000f00, &(0x7f00000001c0)) 2018/04/05 10:22:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x2c) 2018/04/05 10:23:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:00 executing program 2: socketpair(0x15, 0x5, 0x800001e6, &(0x7f00000001c0)) [ 436.683957] RIP: 0033:0x4552d9 [ 436.687146] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 436.694857] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 436.702125] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 436.709401] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 436.716670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 436.723943] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000001b 2018/04/05 10:23:00 executing program 6 (fault-call:4 fault-nth:28): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair(0x14, 0x800, 0x8, &(0x7f0000000000)) 2018/04/05 10:23:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:00 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:00 executing program 2: socketpair(0x15, 0x5, 0x800001ee, &(0x7f00000001c0)) 2018/04/05 10:23:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x2c) 2018/04/05 10:23:00 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 437.527856] FAULT_INJECTION: forcing a failure. [ 437.527856] name failslab, interval 1, probability 0, space 0, times 0 [ 437.539309] CPU: 1 PID: 31314 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 437.546156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.555514] Call Trace: [ 437.558117] dump_stack+0x1b9/0x29f [ 437.561760] ? arch_local_irq_restore+0x52/0x52 [ 437.566463] ? __save_stack_trace+0x7e/0xd0 [ 437.570800] should_fail.cold.4+0xa/0x1a 2018/04/05 10:23:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:01 executing program 0: socketpair$unix(0x1, 0x2000000000000006, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) [ 437.575317] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 437.580430] ? kasan_kmalloc+0xc4/0xe0 [ 437.584325] ? kmem_cache_alloc_trace+0x152/0x780 [ 437.589173] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 437.594403] ? __list_lru_init+0x45e/0x7b0 [ 437.598649] ? sget_userns+0x706/0xf20 [ 437.602549] ? mount_ns+0x8f/0x1d0 [ 437.606098] ? graph_lock+0x170/0x170 [ 437.609904] ? do_mount+0x564/0x3070 [ 437.613625] ? ksys_mount+0x12d/0x140 [ 437.617428] ? SyS_mount+0x35/0x50 [ 437.620982] ? do_syscall_64+0x29e/0x9d0 [ 437.625068] ? find_held_lock+0x36/0x1c0 [ 437.629150] ? __lock_is_held+0xb5/0x140 [ 437.633234] ? check_same_owner+0x320/0x320 [ 437.637568] ? rcu_note_context_switch+0x710/0x710 [ 437.642516] should_failslab+0x124/0x180 [ 437.646590] kmem_cache_alloc_trace+0x2cb/0x780 [ 437.651268] ? __kmalloc_node+0x33/0x70 [ 437.655254] ? __kmalloc_node+0x33/0x70 [ 437.659239] ? rcu_read_lock_sched_held+0x108/0x120 [ 437.664277] __memcg_init_list_lru_node+0x17c/0x2c0 [ 437.669305] ? list_lru_add+0x850/0x850 [ 437.673288] ? __kmalloc_node+0x47/0x70 2018/04/05 10:23:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) [ 437.677277] __list_lru_init+0x45e/0x7b0 [ 437.681351] ? list_lru_destroy+0x4c0/0x4c0 [ 437.685676] ? __raw_spin_lock_init+0x1c/0x100 [ 437.690269] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 437.695303] ? lockdep_init_map+0x9/0x10 [ 437.699376] sget_userns+0x706/0xf20 [ 437.703096] ? set_anon_super+0x20/0x20 [ 437.707081] ? get_empty_filp.cold.7+0x3e/0x3e [ 437.711674] ? destroy_unused_super.part.9+0x100/0x100 [ 437.717615] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 437.722643] ? kasan_check_read+0x11/0x20 [ 437.726804] ? rcu_pm_notify+0xc0/0xc0 [ 437.730701] ? trace_hardirqs_off+0xd/0x10 [ 437.734948] ? cap_capable+0x1f9/0x260 [ 437.739020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.744569] ? security_capable+0xa4/0xd0 [ 437.748729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.754274] ? ns_capable_common+0x13f/0x170 [ 437.758692] mount_ns+0x8f/0x1d0 [ 437.762073] ? rpc_pipe_release+0xb70/0xb70 [ 437.766491] rpc_mount+0x9e/0xd0 [ 437.769866] mount_fs+0xae/0x328 [ 437.773243] vfs_kern_mount.part.34+0xd4/0x4d0 2018/04/05 10:23:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3, 0xbe0, 0x9, 0x0, 0x0, 0xffffffffffff0000, 0x1000, 0x2, 0xd9b, 0x1000, 0x101, 0x3, 0x6, 0x3, 0x42, 0x0, 0x1, 0x3, 0xa, 0x400, 0xf22, 0x2, 0x5d4, 0x6, 0xffffffffffffffff, 0xc6, 0x1, 0x9, 0x3, 0x6, 0x1, 0x8000, 0x3f, 0x100000001, 0xffffffff, 0x7, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x7, 0x5067}, 0x1, 0xcfc, 0x5, 0x7, 0x6, 0x3, 0x2}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x2) [ 437.777919] ? may_umount+0xb0/0xb0 [ 437.781551] ? _raw_read_unlock+0x22/0x30 [ 437.785702] ? __get_fs_type+0x97/0xc0 [ 437.789601] do_mount+0x564/0x3070 [ 437.793148] ? do_raw_spin_unlock+0x9e/0x2e0 [ 437.797568] ? copy_mount_string+0x40/0x40 [ 437.801808] ? rcu_pm_notify+0xc0/0xc0 [ 437.805710] ? copy_mount_options+0x5f/0x380 [ 437.810128] ? rcu_read_lock_sched_held+0x108/0x120 [ 437.815151] ? kmem_cache_alloc_trace+0x616/0x780 [ 437.820002] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 437.825555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.831096] ? copy_mount_options+0x285/0x380 [ 437.835602] ksys_mount+0x12d/0x140 [ 437.839237] SyS_mount+0x35/0x50 [ 437.842606] ? ksys_mount+0x140/0x140 [ 437.846415] do_syscall_64+0x29e/0x9d0 [ 437.850307] ? vmalloc_sync_all+0x30/0x30 [ 437.854462] ? _raw_spin_unlock_irq+0x27/0x70 [ 437.858960] ? finish_task_switch+0x1ca/0x820 [ 437.863464] ? syscall_return_slowpath+0x5c0/0x5c0 [ 437.868399] ? syscall_return_slowpath+0x30f/0x5c0 [ 437.873342] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 2018/04/05 10:23:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can={0x0, 0x0}, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r3, &(0x7f0000001140)={&(0x7f00000000c0)=@can={0x1d, r2}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000140)="07e47dabef00ed670267adfdaf886ae8a4bb18c018a0501b15b9555b494b80722d0e10263bba850a8f95590054a9fd799b6fa6f0831c1f047e3cc8379b6dc05c653a5ee8bae19b66f38c756957dbef8cf9d2bd41b60f54ffb974f48bea6e256e82f81a519d9e8d19a5eeff18cbccd4e02004651ddbf6074264a34b2816a28899915808815e273556e08f95237cf934739ec09d0f3dec053bfe2343d475bd0ac5b6f5d912556c9dfe121aebd2cae397bbd859ccb846f607424b5e7a4c8e0e214f9471d37bf8385c27e01631f44aaae81b99d333d85166fc989dd7e856e16800ea188955dcc66854187f0c6173", 0xec}, {&(0x7f0000000840)="05afc689017fdd88134622522f6edcb233dffd9a56ddef9f7ae90470b4db2280ea5c9d7fae1d4e57ec43764864aeda4cda3146e731ff7ae375d139a0f247902aa8a75603e445ecce4fe2f59ffdc97a7c7e8bd862fa02073c238090810fb28a780b8b1fc54b6619c2b1b4b80903768d20426be690caeedccc3b3b3c864b842bdaa5e58f94db6b6c5719bbead9256699bbdaf48059bbe1c3c81d24ed03a93d279739d769d9dcfbb032825d4c9f510b33c48131af60cab6e8017b0d515b4a91e7eb13a24c350d90ce60c58e9d3be1edc4f72715a2ec837bca68a6b944b1dcc32a0a9f558f3d79f4", 0xe6}, {&(0x7f0000000940)="48c9ae18c801d8ec891f35b51e8adcb97221e9c069c2a187991df3eb48707e4a410fe946595f96c103c9344568a5ae3bb02114d7e34e43b2b7f3f1aa3d5c5b6d62f6ff300caf724814a8ba78739552bf2c9d66e9d380231d", 0x58}, {&(0x7f00000009c0)="7b46c26ca609a85168defd51d0ca6847fa1a5798352b9fceb3252b32e43c9acacee93d8f18f951a9b38c91a8206964136f9c713a67062ab41c6507b3fff809e726fe50e28e2ce750f591e195cfab4dd3f49fba1626f161a95143da790f97357663274a3efee2cd9c60b53a44abe7f49f12c8c197dc4c9975eac108a9e722507b046da180c53c01358145e634000d59969b6687ab2f5c796b7c9c53acb998d8471a08095e72d2ab0b5d8fdaf365b2a330ad97bed81be0ae2858433c44fa0c5f28e0d2c55c77e2f470442d94df80ab4d50", 0xd0}, {&(0x7f0000000ac0)="fe9ddd1c495429d41824432d7ddb2300fdaf9bb67efb808e23715c64014c64c5253694b895420c312456595a63ad7cee51c5fb4f57ca744e3fb5e92307f45ad12389d4fa21285dc9512137d57a2fd0fb9a34204971c220e29407e5171c986424c72d2f93e255196868b3280bc502921dbabf91534aa1fd8113e100d92a4fcf57fecbc604fd21f1e8d972c07853a4d6d8e5a7e575d357484f0c54f68d220dd95d29517a21625d1d7067c5bdb77213645d2fda5a8e00517fee3896ca2a8e360bce5b7e4d01783ebbcdca120fa6f2", 0xcd}, {&(0x7f0000000bc0)="76d2f30249176345a103ec68948c59a1d5eacd2790f6980e06cd018b9f8a0d0a8a926e0b9e3efac8aa4e", 0x2a}, {&(0x7f0000000c00)="7c3e0f88aa89ad5d", 0x8}, {&(0x7f0000000c40)="45cb8fbf7bca944d9985205eccfea3aae78f0ac2dd1c6a431fc8a67cc817426fc2ad5d524e7bfbba9089ddb9d08edc81435ad432fc42e37a99639b782d7e6d70418ade11e13d8341fbdfa241a2d316090b6fb729e7e33b9faf7439a04970d06b86990330d7b99d0a0d42a181229a9189e2852617dafb3cb4807a05b30d7ebef1b18ad10137ffdcaaa59691c4a4d46f5566ffef39a93c28bf4dbe2e711bd28444877c7481f1919057f0f716ed424bcbcb16e9af19882e22cae2b0d59797e184421db786a1388ed311b4355cb1eaaa35526ecf9d6299bd5d79e688e58df9e463f269a71f1b13849d0bef80eb13e8aff4", 0xef}, {&(0x7f0000000d40)="4e494b79e87f3e9cd6cc226fbba41428bcd053369258f7427c2a2b4eea5f29718bb2c4bf88232be9000ccc8d28770f2784e2b77c75f4b25d28d204ee9ac34dcd528851b8001e2c682847b6d5b03c05da8697182c09a20b", 0x57}, {&(0x7f0000000dc0)="28f7f01073deb56f1ebd928d8ad353c8dd401fbf1c6a33df88db6c146016c2af72e83cffefccec14bd758d3cbbe96fd268d715db2fd39614a97c71355fea316fcccbae5cd6886500ca86ea5a07d00476ba1a999ef697b2305110717fb75790485963916544466569107c6708", 0x6c}], 0xa, &(0x7f0000000f00)=[{0x68, 0x112, 0xffff, "624194f4245cff6b9529eb2c26409ecb68a111b823e00c332777eea8564356a90f2212100150bf6d8c726fb8bb3bb9b37411a1a6aae44daa3d8e09125149c8b50e08305b93a3f905a67dfdbbf69316f5671d"}, {0x50, 0x1ff, 0x5, "55c4d4657b0c565fd2ffced740da55c887cf1f11024d5433129f2b7e915b5cd32089dc578b2c36f3bbb6c173ee37ce84d50721a947b19405f5d555e3ffb8"}, {0x88, 0x29, 0xfffffffffffffff8, "26aa3ec36a04fa3da265f7d65880df682c3a007e6fb27a49670bf088f74c734c8c3865f25c732e6b46a6bf54aff84dcde8f94a1ccc18124312abc36d9b02b0a6b85ceeb0a80107695938f4ac1f66cbc9e9a2d362d0cae0689ae8360412bb6b5d96e1deae5f10a60b962d5e7e48759f62b37814e7"}, {0xd0, 0x0, 0x1, "5eba72d0d8fce7430e563390524c4bd15ec07e30895ff6b33f38af3ba406a2f897a2fa3bec8859d4283bf8e13e3d2afa3d4379909d880240d9ae1ab82df5f172d5c45fc2c153ada2d06d81a1ef8231df62943beccbe432caaa8275e49a53bc1cf2ce4047fa4e1faae9a9a51f99725b96270203162a71658817f49fd80b9979a18a2dbe3044c0b50c71435d09ee22ab52c4236540b4d3b5d29188ddf51fdaec89b5a8b16d1ad5c3cc3c04029b1f0b0fb56074bb0361e9a2f737f9c5"}], 0x210, 0x810}, 0x4001) sendmsg$kcm(r3, &(0x7f0000000800)={&(0x7f0000000280)=@ethernet={0x306, @random="81d384f58f45"}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000300)="c41515454281bcf6fdbcc61128157c2c61976b31679cc699c5b167b9882cd843ff559b45083cfe9ee0fb047e7bb6b11cdf1d6657192e7f6bbb659e5d3a03bfffa8a4edf29530d0b27334dd8ea35eddbe13fbc966a1c85977cd58cfa2446ef46a4234e28c52d0ff60b11f47254b3845735e6610cf66e433402eb4f30808cd00003f2d406580fa8afb359be159d4f2d4e06133585d60f881102e164196ed88395368eeb2c128b449f461e4702daa83db0cf6698d11e9e9fad3b06dd5e9d65e1a0201a91a9369ad6e0521f7f0a20eb0e5568af298af", 0xd4}], 0x1, &(0x7f0000000440)=[{0x40, 0x10f, 0x2, "8faa64cb19a066d9a66ea24661e18746b0392af29bfc00e7ae0a9311d43a3c565eec66e773acb2ccb9"}, {0x90, 0x109, 0xfffffffffffff07e, "12817a33019b162522af1b68346b00a269b1702e17ad28e481bc4835945cc2e7390792ea453dec5c30fd9c3be02789ea13a73ce73ea4b3486129567d5322feee9e68237d5fac6b038095e4d0f8064268295b619172d867f941e77c7307f524f066e9e6af5d0ac8589567d8ba5cd81c422d9d457ea2e9c518575e6109de"}, {0xf8, 0x102, 0x5, "2416348206098c5d2a586c156650e392614a2c0fc698ac0d480b1d3454d695480ff4f3f472d453eac764bcc0968686a7f4cd55f2b168b818203cb27ab613ac41e2297c1d94ce6bc5cc62451f7465f2a583a297c4bfd5f9071585d22697055c402be07cddba793eea74437bcdaa47f677b5b21209badc5b7fd2700cc6848c0f6918ba4bdef8bd5f324e5be73887461f3d3fbe2a2070b505ead2188e72bbe082f54eef15596a6a50136788cc1d417c898c4f05b7cca0791756201d99957bc1dccdea8ea036ee6c9298647faa9565e04470d5807fadf77c3c2a6dde2fc22012f92c6194d284e7"}, {0xf8, 0x115, 0x7, "b3dc867e09b147f520b4f14ac29859aa1dff23c9d8560705f7d0220eebca2950d1be8883f3f39601d3f3fef2b1e3e3bf1f85d7d03f9751fb7a385f190b7de5741ebb94483a6753d9e42350ab97fdef4b798fb0c1ce5532dfa91d991ac7aeaf51f50515d4fd5d7fc727c926c5e4564d8aa788920bdbeb2dad88ba30c9cec6877c7589ebafbb89d4230650d35d3e4f7d181ddf4d13cc150a63f6efe980df12e77c7cb177c9a0a268eb560f45fc00dc9d51c65d4376e7b9cbd4811e8a38f235e15d27e4d6d635c592945ceb1067707a27d48d5ec78b5c16b906608b03d2e952dd9ecbc2"}, {0xe0, 0x13b, 0x800, "d6909ff037bf2111e2501ab97b2ed134376781ef0e1fa039b67ba6ec271caa9e05f2fe80974fd04784f22fd45a28f5bec1760f4888fd3cc10918d8c38f07165c274d13755697867f18b7bb0a59f09e29c602f22c437ee61329af1221b0b101667e49dd7c91343fa808202f5f106c8638b1d0e4a1df371a1c4a5604670b24512292da4ba6301d09d3be1ba284d9bad1c64dfe239d1dc4847edea32e5e280eceb4901ed5d504c011aca3057d7ec27c162c9cfa962693bd5edaf4e73471d4b122728b1b75428ff64900da3ba68f"}], 0x3a0, 0x20000001}, 0x10) [ 437.878731] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.883590] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 437.888780] RIP: 0033:0x4552d9 [ 437.891968] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 437.899685] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 437.907133] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 437.914408] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 437.921856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 437.929129] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000001c 2018/04/05 10:23:02 executing program 6 (fault-call:4 fault-nth:29): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0x0, 0x0}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000440)=0x70000000000, 0x4) close(r1) socketpair(0x2, 0x1, 0x1ff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x4) r4 = gettid() perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x7fffffff, 0xfffffffffffffff7, 0x8, 0x3ff, 0x0, 0xffffffff, 0x20, 0x4, 0x800, 0x7, 0x0, 0x8, 0x4b, 0x5, 0xffffffff, 0x1, 0x5, 0xffffffffffff88e4, 0x0, 0x7fff, 0x100000001, 0x7, 0x7fff, 0x101, 0x0, 0x1, 0x5, 0x9, 0x80, 0x5, 0x2, 0x1f, 0xa8f, 0x7, 0x1, 0xff, 0x0, 0x7ff, 0x7, @perf_bp={&(0x7f00000000c0), 0x8}, 0x0, 0x10000000000, 0x8000, 0x7, 0x4, 0x5, 0x6}, r4, 0xd, r3, 0xb) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000280)=@nfc, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)=""/130, 0x82}], 0x1, &(0x7f00000003c0)=""/38, 0x26, 0x800}, 0x40) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000004c0)) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00000001c0)) 2018/04/05 10:23:02 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:02 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x2c) 2018/04/05 10:23:02 executing program 2: socketpair(0x15, 0x5, 0x8000ed01, &(0x7f00000001c0)) 2018/04/05 10:23:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 438.637824] FAULT_INJECTION: forcing a failure. [ 438.637824] name failslab, interval 1, probability 0, space 0, times 0 [ 438.649384] CPU: 0 PID: 31373 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 438.656235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.665599] Call Trace: [ 438.668400] dump_stack+0x1b9/0x29f [ 438.672141] ? arch_local_irq_restore+0x52/0x52 [ 438.676858] ? __save_stack_trace+0x7e/0xd0 [ 438.681207] should_fail.cold.4+0xa/0x1a 2018/04/05 10:23:02 executing program 2: socketpair(0x15, 0x5, 0x80003300, &(0x7f00000001c0)) 2018/04/05 10:23:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x2c) [ 438.685291] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 438.690408] ? kasan_kmalloc+0xc4/0xe0 [ 438.694331] ? kmem_cache_alloc_trace+0x152/0x780 [ 438.699190] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 438.704392] ? __list_lru_init+0x45e/0x7b0 [ 438.708640] ? sget_userns+0x706/0xf20 [ 438.712546] ? mount_ns+0x8f/0x1d0 [ 438.716119] ? graph_lock+0x170/0x170 [ 438.719933] ? do_mount+0x564/0x3070 [ 438.724002] ? ksys_mount+0x12d/0x140 [ 438.727811] ? SyS_mount+0x35/0x50 [ 438.731361] ? do_syscall_64+0x29e/0x9d0 2018/04/05 10:23:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 438.735447] ? find_held_lock+0x36/0x1c0 [ 438.739545] ? __lock_is_held+0xb5/0x140 [ 438.743638] ? check_same_owner+0x320/0x320 [ 438.747976] ? rcu_note_context_switch+0x710/0x710 [ 438.752927] should_failslab+0x124/0x180 [ 438.757013] kmem_cache_alloc_trace+0x2cb/0x780 [ 438.761695] ? __kmalloc_node+0x33/0x70 [ 438.765682] ? __kmalloc_node+0x33/0x70 [ 438.769672] ? rcu_read_lock_sched_held+0x108/0x120 [ 438.774719] __memcg_init_list_lru_node+0x17c/0x2c0 [ 438.779750] ? list_lru_add+0x850/0x850 [ 438.783743] ? __kmalloc_node+0x47/0x70 2018/04/05 10:23:02 executing program 2: socketpair(0x15, 0x5, 0x80007901, &(0x7f00000001c0)) [ 438.787742] __list_lru_init+0x45e/0x7b0 [ 438.791820] ? list_lru_destroy+0x4c0/0x4c0 [ 438.796155] ? __raw_spin_lock_init+0x1c/0x100 [ 438.800754] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 438.805794] ? lockdep_init_map+0x9/0x10 [ 438.810042] sget_userns+0x706/0xf20 [ 438.813773] ? set_anon_super+0x20/0x20 [ 438.817758] ? get_empty_filp.cold.7+0x3e/0x3e [ 438.822349] ? destroy_unused_super.part.9+0x100/0x100 [ 438.827647] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 438.832677] ? kasan_check_read+0x11/0x20 2018/04/05 10:23:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x2c) 2018/04/05 10:23:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 438.836840] ? rcu_pm_notify+0xc0/0xc0 [ 438.840733] ? trace_hardirqs_off+0xd/0x10 [ 438.844976] ? cap_capable+0x1f9/0x260 [ 438.848876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.854425] ? security_capable+0xa4/0xd0 [ 438.858591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.864139] ? ns_capable_common+0x13f/0x170 [ 438.868562] mount_ns+0x8f/0x1d0 [ 438.871937] ? rpc_pipe_release+0xb70/0xb70 [ 438.876272] rpc_mount+0x9e/0xd0 [ 438.879652] mount_fs+0xae/0x328 [ 438.883559] vfs_kern_mount.part.34+0xd4/0x4d0 2018/04/05 10:23:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 438.888151] ? may_umount+0xb0/0xb0 [ 438.891790] ? _raw_read_unlock+0x22/0x30 [ 438.895950] ? __get_fs_type+0x97/0xc0 [ 438.899851] do_mount+0x564/0x3070 [ 438.903406] ? copy_mount_string+0x40/0x40 [ 438.907660] ? rcu_pm_notify+0xc0/0xc0 [ 438.911567] ? copy_mount_options+0x5f/0x380 [ 438.915993] ? rcu_read_lock_sched_held+0x108/0x120 [ 438.921113] ? kmem_cache_alloc_trace+0x616/0x780 [ 438.925969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 438.931517] ? _copy_from_user+0xdf/0x150 [ 438.935678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.941235] ? copy_mount_options+0x285/0x380 [ 438.945753] ksys_mount+0x12d/0x140 [ 438.949398] SyS_mount+0x35/0x50 [ 438.952774] ? ksys_mount+0x140/0x140 [ 438.956585] do_syscall_64+0x29e/0x9d0 [ 438.960565] ? vmalloc_sync_all+0x30/0x30 [ 438.964718] ? _raw_spin_unlock_irq+0x27/0x70 [ 438.969223] ? finish_task_switch+0x1ca/0x820 [ 438.973727] ? syscall_return_slowpath+0x5c0/0x5c0 [ 438.978751] ? syscall_return_slowpath+0x30f/0x5c0 [ 438.983699] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 438.989074] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.993932] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 438.999123] RIP: 0033:0x4552d9 [ 439.002313] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 439.010028] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 439.017307] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 439.024579] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 439.031848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 439.039120] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000001d 2018/04/05 10:23:03 executing program 6 (fault-call:4 fault-nth:30): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)) recvmsg(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@can, 0xfe56, &(0x7f0000000800), 0x0, &(0x7f0000000040)=""/93, 0xfffffffffffffe85, 0xfffffffffffffffd}, 0x0) 2018/04/05 10:23:03 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653012", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:03 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:03 executing program 2: socketpair(0x15, 0x5, 0x80000159, &(0x7f00000001c0)) 2018/04/05 10:23:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x2c) 2018/04/05 10:23:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 439.879868] FAULT_INJECTION: forcing a failure. [ 439.879868] name failslab, interval 1, probability 0, space 0, times 0 [ 439.891177] CPU: 1 PID: 31429 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 439.898045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.907405] Call Trace: [ 439.910036] dump_stack+0x1b9/0x29f [ 439.913676] ? arch_local_irq_restore+0x52/0x52 [ 439.918357] ? __save_stack_trace+0x7e/0xd0 [ 439.922702] should_fail.cold.4+0xa/0x1a [ 439.926778] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 439.931894] ? kasan_kmalloc+0xc4/0xe0 [ 439.935793] ? kmem_cache_alloc_trace+0x152/0x780 [ 439.940645] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 439.945842] ? __list_lru_init+0x45e/0x7b0 [ 439.950092] ? sget_userns+0x706/0xf20 [ 439.953990] ? mount_ns+0x8f/0x1d0 [ 439.957537] ? graph_lock+0x170/0x170 [ 439.961356] ? do_mount+0x564/0x3070 [ 439.965086] ? ksys_mount+0x12d/0x140 [ 439.968890] ? SyS_mount+0x35/0x50 [ 439.972439] ? do_syscall_64+0x29e/0x9d0 [ 439.976519] ? find_held_lock+0x36/0x1c0 [ 439.980595] ? __lock_is_held+0xb5/0x140 [ 439.984677] ? check_same_owner+0x320/0x320 [ 439.989010] ? rcu_note_context_switch+0x710/0x710 [ 439.993960] should_failslab+0x124/0x180 [ 439.998038] kmem_cache_alloc_trace+0x2cb/0x780 [ 440.002730] __memcg_init_list_lru_node+0x17c/0x2c0 [ 440.007758] ? list_lru_add+0x850/0x850 [ 440.011738] ? __kmalloc_node+0x47/0x70 [ 440.015724] __list_lru_init+0x45e/0x7b0 [ 440.019798] ? list_lru_destroy+0x4c0/0x4c0 [ 440.024129] ? __raw_spin_lock_init+0x1c/0x100 2018/04/05 10:23:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x2c) 2018/04/05 10:23:03 executing program 2: socketpair(0x15, 0x5, 0x800000b3, &(0x7f00000001c0)) 2018/04/05 10:23:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 440.028729] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 440.033761] ? lockdep_init_map+0x9/0x10 [ 440.037833] sget_userns+0x706/0xf20 [ 440.041562] ? set_anon_super+0x20/0x20 [ 440.045550] ? get_empty_filp.cold.7+0x3e/0x3e [ 440.050141] ? destroy_unused_super.part.9+0x100/0x100 [ 440.055432] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 440.060455] ? kasan_check_read+0x11/0x20 [ 440.064609] ? rcu_pm_notify+0xc0/0xc0 [ 440.068499] ? trace_hardirqs_off+0xd/0x10 [ 440.072745] ? cap_capable+0x1f9/0x260 [ 440.076643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.082187] ? security_capable+0xa4/0xd0 [ 440.086347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.091893] ? ns_capable_common+0x13f/0x170 [ 440.096319] mount_ns+0x8f/0x1d0 [ 440.099693] ? rpc_pipe_release+0xb70/0xb70 [ 440.104026] rpc_mount+0x9e/0xd0 [ 440.107405] mount_fs+0xae/0x328 [ 440.110785] vfs_kern_mount.part.34+0xd4/0x4d0 [ 440.115378] ? may_umount+0xb0/0xb0 [ 440.119009] ? _raw_read_unlock+0x22/0x30 [ 440.123163] ? __get_fs_type+0x97/0xc0 [ 440.127062] do_mount+0x564/0x3070 2018/04/05 10:23:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x2c) [ 440.130607] ? do_raw_spin_unlock+0x9e/0x2e0 [ 440.135024] ? copy_mount_string+0x40/0x40 [ 440.139265] ? rcu_pm_notify+0xc0/0xc0 [ 440.143164] ? copy_mount_options+0x5f/0x380 [ 440.147575] ? rcu_read_lock_sched_held+0x108/0x120 [ 440.152596] ? kmem_cache_alloc_trace+0x616/0x780 [ 440.157451] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 440.162997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.168800] ? copy_mount_options+0x285/0x380 [ 440.173312] ksys_mount+0x12d/0x140 [ 440.176949] SyS_mount+0x35/0x50 2018/04/05 10:23:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 440.180318] ? ksys_mount+0x140/0x140 [ 440.184128] do_syscall_64+0x29e/0x9d0 [ 440.188021] ? vmalloc_sync_all+0x30/0x30 [ 440.192182] ? kasan_check_write+0x14/0x20 [ 440.196433] ? syscall_return_slowpath+0x5c0/0x5c0 [ 440.201372] ? syscall_return_slowpath+0x30f/0x5c0 [ 440.206319] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 440.211694] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.216553] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 440.221742] RIP: 0033:0x4552d9 [ 440.224932] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 440.232644] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 440.239920] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 440.247198] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 440.254473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 440.261767] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000001e 2018/04/05 10:23:04 executing program 6 (fault-call:4 fault-nth:31): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)=0x80000000, 0x4) socketpair(0x0, 0x800, 0x2, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000180)) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0xfffffffffffffffa, 0x5, 0x2, 0x401, 0x0, 0x80000000, 0x11, 0x2, 0x6, 0x9566, 0x1, 0x2, 0x5, 0x81, 0x101, 0x5, 0x5, 0x8, 0x0, 0x5, 0x7, 0x1f, 0x4, 0x200, 0x5, 0xbf, 0x7, 0x5, 0x10000, 0x7, 0x6, 0x71, 0xffffffff, 0x8001, 0x5, 0xe5, 0x0, 0x9271, 0x1, @perf_config_ext={0x3, 0x8}, 0x8000, 0x4, 0x40, 0x6, 0x35340000, 0x4, 0x401}, 0xffffffffffffffff, 0xc, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) 2018/04/05 10:23:04 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:04 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653003", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x2c) 2018/04/05 10:23:04 executing program 2: socketpair(0x15, 0x5, 0x80004201, &(0x7f00000001c0)) 2018/04/05 10:23:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 440.950364] FAULT_INJECTION: forcing a failure. [ 440.950364] name failslab, interval 1, probability 0, space 0, times 0 [ 440.961784] CPU: 1 PID: 31470 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 440.968637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.978000] Call Trace: [ 440.980602] dump_stack+0x1b9/0x29f [ 440.984294] ? arch_local_irq_restore+0x52/0x52 [ 440.988975] ? __save_stack_trace+0x7e/0xd0 [ 440.993325] should_fail.cold.4+0xa/0x1a 2018/04/05 10:23:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 440.997403] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 441.002519] ? kasan_kmalloc+0xc4/0xe0 [ 441.006416] ? kmem_cache_alloc_trace+0x152/0x780 [ 441.011267] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 441.016468] ? __list_lru_init+0x45e/0x7b0 [ 441.020712] ? sget_userns+0x706/0xf20 [ 441.024608] ? mount_ns+0x8f/0x1d0 [ 441.028158] ? graph_lock+0x170/0x170 [ 441.031967] ? do_mount+0x564/0x3070 [ 441.035685] ? ksys_mount+0x12d/0x140 [ 441.039494] ? SyS_mount+0x35/0x50 [ 441.043042] ? do_syscall_64+0x29e/0x9d0 2018/04/05 10:23:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:04 executing program 2: socketpair(0x15, 0x5, 0x8000012b, &(0x7f00000001c0)) [ 441.047116] ? find_held_lock+0x36/0x1c0 [ 441.051207] ? __lock_is_held+0xb5/0x140 [ 441.055288] ? check_same_owner+0x320/0x320 [ 441.059622] ? rcu_note_context_switch+0x710/0x710 [ 441.064572] should_failslab+0x124/0x180 [ 441.068644] kmem_cache_alloc_trace+0x2cb/0x780 [ 441.073326] ? __kmalloc_node+0x33/0x70 [ 441.077308] ? __kmalloc_node+0x33/0x70 [ 441.081295] ? rcu_read_lock_sched_held+0x108/0x120 [ 441.086328] __memcg_init_list_lru_node+0x17c/0x2c0 [ 441.091362] ? list_lru_add+0x850/0x850 [ 441.095351] ? __kmalloc_node+0x47/0x70 [ 441.099345] __list_lru_init+0x45e/0x7b0 [ 441.103428] ? list_lru_destroy+0x4c0/0x4c0 [ 441.107780] ? __raw_spin_lock_init+0x1c/0x100 [ 441.112374] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 441.117420] ? lockdep_init_map+0x9/0x10 [ 441.121495] sget_userns+0x706/0xf20 [ 441.125214] ? set_anon_super+0x20/0x20 [ 441.129201] ? get_empty_filp.cold.7+0x3e/0x3e [ 441.133792] ? destroy_unused_super.part.9+0x100/0x100 [ 441.139084] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 441.144113] ? kasan_check_read+0x11/0x20 2018/04/05 10:23:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 441.148274] ? rcu_pm_notify+0xc0/0xc0 [ 441.152166] ? trace_hardirqs_off+0xd/0x10 [ 441.156407] ? cap_capable+0x1f9/0x260 [ 441.160306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.165854] ? security_capable+0xa4/0xd0 [ 441.170013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.175562] ? ns_capable_common+0x13f/0x170 [ 441.179985] mount_ns+0x8f/0x1d0 [ 441.183355] ? rpc_pipe_release+0xb70/0xb70 [ 441.187682] rpc_mount+0x9e/0xd0 [ 441.191060] mount_fs+0xae/0x328 [ 441.194434] vfs_kern_mount.part.34+0xd4/0x4d0 2018/04/05 10:23:04 executing program 2: socketpair(0x15, 0x5, 0x8000c501, &(0x7f00000001c0)) [ 441.199026] ? may_umount+0xb0/0xb0 [ 441.202663] ? _raw_read_unlock+0x22/0x30 [ 441.206818] ? __get_fs_type+0x97/0xc0 [ 441.210721] do_mount+0x564/0x3070 [ 441.214280] ? copy_mount_string+0x40/0x40 [ 441.218526] ? rcu_pm_notify+0xc0/0xc0 [ 441.222429] ? copy_mount_options+0x5f/0x380 [ 441.226850] ? rcu_read_lock_sched_held+0x108/0x120 [ 441.231932] ? kmem_cache_alloc_trace+0x616/0x780 [ 441.236803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.242347] ? copy_mount_options+0x285/0x380 [ 441.246856] ksys_mount+0x12d/0x140 2018/04/05 10:23:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0x2c) [ 441.250493] SyS_mount+0x35/0x50 [ 441.253867] ? ksys_mount+0x140/0x140 [ 441.257678] do_syscall_64+0x29e/0x9d0 [ 441.261574] ? vmalloc_sync_all+0x30/0x30 [ 441.265738] ? _raw_spin_unlock_irq+0x27/0x70 [ 441.270241] ? finish_task_switch+0x1ca/0x820 [ 441.274750] ? syscall_return_slowpath+0x5c0/0x5c0 [ 441.279689] ? syscall_return_slowpath+0x30f/0x5c0 [ 441.284637] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 441.290034] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 441.294897] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 441.300090] RIP: 0033:0x4552d9 [ 441.303281] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 441.310998] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 441.318283] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 441.325560] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 441.332839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 441.340119] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000001f 2018/04/05 10:23:05 executing program 6 (fault-call:4 fault-nth:32): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:05 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:05 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:05 executing program 2: socketpair(0x15, 0x5, 0x8000a500, &(0x7f00000001c0)) 2018/04/05 10:23:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x2c) 2018/04/05 10:23:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) close(r1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0xfffffffffffffff8, 0x10}, 0xc) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair(0x77d78e23698bb48e, 0x800, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x5) sendmsg(r0, &(0x7f0000000200)={&(0x7f0000000180)=@l2={0x1f, 0x8, {0x75d4457d, 0x80, 0x334, 0x0, 0x0, 0xc3}, 0x7fff, 0x39}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000280)="f7101717e28c18ab3b79586794a32f2dc2dc57bf60d19c10932b637b879ad0c824206d14cf37666a274ae1e294682d4b206228c9453b3939b187caa144e847119cfc80ac54dc4984cb586ff403588ac98fd63808e40d917c977b95ffa11851b7ccf823950fb96bbfb635d241e2265d29351077dbd5c3ebc45611c12376cd1b8c42488be5a135948ad62694c672a84ed6f4fb92", 0x93}, {&(0x7f0000000340)="93e91891b003cf677325b0f5687a0dd53f6822e42e7ddbc9bf2b8d37aa0b4dadf789e07e31af52a0f4207b6c2074ef450b3b055f688c5f35ecea0957423b3d73c0b0bce4c0a325aaabb91efc646d1184f62bf36523bde56c427e4bb1d1f1d6d14d6d8a2e3d22fdd90c1f2edf6ad8217208ccbd68a924fa170c82f24715e1930d1f226926b260360c3e604d47efe8fd2f964bc09b46b2f9db31d3b805b16dd201576c613f3df03f1021da01cccb41df28be90b5876ce736f8997e890ea7446eab7e6661713ca5b5117a641f55", 0xcc}, {&(0x7f0000000440)="8b03f21e37efeba637d8f93f0b970f4b40dd865a5508b9918b7cc3d892c142a08d55a056f14ac5f302ab193105caac815f0d5ddf27bb10704b3695496a1ed5bdfe18b551d2961568442611705721baf412848b9a843dbb33936501028eb18657794a9427e503c7b8e4389b2d6e8bedba7aa94635740788eae3e800ae32e99ddc38bf84472ad99c2b2e6ccbd31d3b427f5642b419e61fb9496dddf82d44473c34a60af2b902fbd5dd46d085712273190f2a18279f661a08e03dd76125d5c4", 0xbe}, {&(0x7f0000000500)="77e6da367e7770f6ec32a9fa117abb680f5ea8416babdcc5c15a4e4ea6053476e0d274edb7759947d339e483ef2190f0d33a97ac8e381bcf15526e2d769925bf27fbc42aa1dbc9a33a5940a826fcadaa1f5c9f03b26353662dd2a9c2642b05241b7743f082a0e99b26f3aa0ff8f5ea0ce5c98fd90779156637ebf32bce024a59d53b56e2aa7f2a0473a3c05fd94157dda20ca931e84d2c150a5c77c83c4f455004ccef4b", 0xa4}, {&(0x7f00000005c0)="10fd15bac22a389f28612c3c35597ef6c4eb2eb1542770b616d35baf3dd00c9b9c4e5c8b37d6a22e7b88a8cca99dd8dadd6c93a1917bc885b54f5595abd7fd159c94122d098665ef528ae29e93d23834ab277d3af101dd42e7085536542cfecea7681629c26b7d17ff69173796971b3f1a96a097ecc8f776e7ccec06899ca78f69c13104d89aff77f60b472d3ffe1cf5989621e059126359f9b262dc065415385c15e621d460758b7ab9cc471d2e50533b00b078b98df016e5", 0xb9}], 0x5, &(0x7f0000000700)=[{0x78, 0x101, 0x1, "c81599d82572e4a530bf9028ac48ceabdcc436c934a359446073614b5fd1697c397547b90454a1b753e624e015ee07e0b4c4ffe2e0942be120d4f464ed039b82604b9b852d8a2745530a4b9b7ad99255eb7a3fb5b7cd9327a443e9c79648e25af2"}, {0x100, 0x10f, 0x122, "7aa15d1d7c33ee422192a412e99d8379c8d3e0302f14b94830fa142f9837eb47cbd477c679d6ffed8f6019685f8ccbfd62b29b6bc93487b88a5116d8f4541bf338299c7fc071b86b49026c6a090339f53e0fa11f6fbb60d8d69f2a321de13bac9d153ae742faf2d3de67a6517b857c6924cb897b6c6f1d199aed4847aa24a02ff29fa77e9ba5c14927325a72ca08ab7ef40881f7130c7bbed7a790ad4d67fd8b79aa9a609b1bc907646290ccbecc6cb40a03cb4fe87c7c42769dcdffdf155f356fb4c87e43921d895e3956972edd616e1e3f8097dd45743a223696c6ffae666fb7fd717aaae53ca6728f24"}, {0x38, 0x119, 0x24f, "b28a73b05c3c750db1369c39e4b5217f8b4551aee34d558d874a8f06ca60034c7e"}, {0xd8, 0x117, 0x0, "2b81e824b65eeabc3e68375f4d73080ad0446f9aeb1b40b540d815a29e5912ef6b7865d0d6151588ed7a23d0a39c04d23a579a4e24feeb94e8338eb8884bd3ba781d8458f5eb03a9b0970c34c68e3ba90d1f77a519511958a72fbe6d84be5a1fb57a3a16852fc4afb3c5c1240a472a353e9adac057eabe1f226a40ef776bfa921e9fa3753defdb802bacc45d08d3a7ea987c91b3602845bba32f17c61e16e709206420d9912997722d746a901802b7d1f6cf96cd1d3ad7f2e48744c20b48d4e7e136d6"}, {0xf8, 0x84, 0x8f87, "16aa69766552ba5dd0c44e819fbac8d88b080e020508f31c06ac26a4f67a6153edf0200995376e93260573e22f3621b22cb0dabec4f0501a8dce9ad4680107bd097f8b34c030377c122ae2771504409b32758759628263230f32f54d187e13a154f69571b85b07eb2ae2f20e4b44fa224e6e46dd70b7a3fd7d85b707815c2b04ea8dd7cd88ef003341e78353009b060123e31f64347a6a82b834fabbd03659c5e9ea01f2a0d6469ca408e0b55c33e4a9f6b052460a5a56292825a3362e870c1a02d9ff7c4cdc190d9d0de871fb1e0e8e2c926f6492c8cf963729ac81eae99f6275"}, {0xb0, 0x113, 0x800, "83b8a9356d9c90e0f550944abded32c2b614cacbfbedb29432670d2f2a5f8ba0c2e92f8a7c327471dbc7e3871b9d31028ca38618c007845178a3d5f2fb1c0c5c13aa42df96800daa67ce8d05c10367e1016fb6b98f712415e0fb87161a3c340a8b65728267efbc31a6505520075d00699c934be836d42f307b150cd6d46b6f6b5ac9b5afdb39abb6f043a1589a0d30479cd28f892819ce492aee"}, {0x98, 0xff, 0x800, "d2b28e2c73ac3e9b7847d0c708a5d645927e0a80742faa5bcdd79815e226c43e4ebad707b65f3316c7d9845261051e0191ff7744f6ee3f5db7dd2c81014284388731f5684f85caa5aa41af0036c81baea43789b5ac2076c6f5973140440955ddb0a60869372e25a4de771fe2adeee8cf485de8cbb36fb6b4feddaa2db1a6e86a9e62ef840e"}], 0x4c8, 0x4000}, 0x800) sendmsg(r3, &(0x7f0000001d80)={&(0x7f0000000c00)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000000c80)}, {&(0x7f0000000cc0)="e0167a1015036766ad255eca7c39ae2d4e2be43fc1728c05c57229d55697f066cce59162d97fa52f84739fb547892dd165218460ae25e455dfa024656cd6f044d634396f311383fa0f65e5bc1da2a0fb4241ed5ed6c75e0df05f7dbe85bc3a02d7933a7b084fdee68bd18c8dd42ad7110672bf63efbf697ef05cd508a4d84cccece08ce3973edd501bef1728847bbbd3bf73320fa1891608d625c94c83548c476f6f2fe7f36bc415bf5f89ad062c110f54bae56883c7b128fe414a0638ebffce086b03202ed8abc0b16768990af23fdea346dfafd4d22e8494d453c657e499228e674222dd97db57340b313acba8c26a1baecc9d1c8546c561b8b282f8005a7673789d68b7baaf63b54e3ab9d62336001b5495ecf032567d0130dd08ffe9d53f0d437b78897e5fbec87c87f4a15185a2faff4d9f9103df30d0475ccf3fc4bba14240e967e7cac316586b44aa7d2cdd74954fd70f622d309057230f289bb323aea5aa107b6398cbc5eef2cf3378152d5e17b78fc191228c13f01637ff0f3b199343acc31484f71c6ae78cf020f0daac7bfd68f699ba6baa4dbc75b9ccd85fb56689b0b7d3673b97464f72f858d6ab6d5b91995ef1f73f222da04476a9058cfec39d802d92a71e40f8f8c64af0dd7d7e7dd988e033ca89a68259c64a8f5e4841fab6aafd3ee3ea9a0709e63558e558769899d25d30613b4fb983b60d73be032ff46084fe5168c130887461ee7b9da7a492ff2924bedf7db04794f592430eb3d3dd08848cc3119411cd9ce3deccf0cf323228d9f7eb2e3d7c3c68f62d2ddc0bf0e8917e0e35d86df39cc444b1309747d2a177db606cee9efd276672dff152fb0dbe8b1060ed12c994ddb5b5ed8c614ae071d98ae9d1eeef9e913818c825cb687bfa43a91a68413652118690cc7e883c0c7eb5c70d713a694dfc0b0cf15cf6e11f83af37d727ac3e66bab2a232d66f785bf7a8770e8e9bc54888a6cd317d1510ad45eecb146741d626adfe2dd24ad3dc9d05365de41d51119d3055cecfeec8294a6b5e666c7872a8dac27171efce0a191b006ee8b99fc8faf3702dd233b9ad719fe508c8ba519c26500e180d64139fcf1384ae45ec821919ea2fc9be6727669c75adfe034952978a3e61aefd8e9c364e927623e83460964019a5a2efaa35b189f1c19a6afbd5830a94b1479a30f9d69e760b975d1c2bba1f32545477c7aa30f2bd4619144417279d02b275a02bb61588fc281320fc50206947950e93bded76378aeeb5550372504dae660dbf0c6a77510a75fa9048ab6c20672258e2600c4243de4fbf9f2ef53bfd7fa5684fb76f88d455b5d387463954ddcfbddec2cace89922601a2b8f27226678b377b7501a992426fc5fd7e8da68acde917c4362ce186ec70e0b2f97268146e7b85bc45eebfc875a448d354ff27e41df596382b3ec72ec080a5b025bc21da604043e3252b0a641bcd317f66bab291bf53f0528fb66a9f9e93b104dbd794a05912e3f514ae45a5e51a4f36df3614dc3e0d9828f98cede5774948212126174a3048228cd7488f8d27228b93f89b5d10d2c31868540eeefd0692d69095af84edeba7a7b643f26551d585bd6f3dd32395d7e497a807e43a6ae86504ad9fe40ee53137e479ec60aebda869b2c7ac4031afcd8a175d3bece97667399bf408c621195fbc2b670912f75315e4562a200c1c943924e5184741096b9693e1c533755803e9ba8573cb4e2c186a04008b8b8ae062c4f8c350439bcc110e3db36e17e6cedddcde70a890b4b41e936b25a7c06bacd2616a8691aea2e4a1e8f8537fab7cac654bd7a8396a01ad4089b7291cbfb358e723e8e71014a2401b1260bcfc94cefb88b86c521e25d98a473ca4c90ee9f829a53e8968b1c402776eef5078b5a257a9bdb6007f0917c797070078b731dbc0ef123ea175f4bf90f6012d0d2a544e49388360e0dc25cd68aebe108a411c7c17c89ed71a71651d6a5902c78283c0b9906aaed339939437a41a89fc5f89ece1ff7a4effd7d9d423211137af69041dc381c33c447fd2b28d35c388ec73d0f9113380404cb411a22fb343ea115bfe6a6f3833ba96ec9a8643fe579267bfa601c28495c24a7ec91830b9c563a358b9568efeda2e102b06825dad121d1b843744b6c252ef44ff3653089cf7f8fde22bc5d6b6a6aa5107d2d6481d2bb9f79dccdbc5e5d0893509b56a03388b40678a59e10f31d9bf725b635d11bd35838ad75e3a893a58c972cf30894a066077b71d56c380520c9720c345ae9f84cbec123824cdb4c93bc6b24d38aa48dff65788a629dceefd9b4f5381849a20c9f512ce5e8c910e00dbf7d751336bdc37074c52c28f1cf311b821b1ba0f8514630f3e1c16b862f7cd6ca8bb6c628c20248992d24581aa13f94aab962263b11db2af395a3afdfcb9219196005de727c07c32ca1bc30365a896216ce7f36a54959405186fcfcb3b3d92cd0b9f2e94a16a7e6840f86c6c45e6d16ac7f92ef7b579de766ecd55206696c0aea8b92888416f46237957b7783f0ad8dcb2ab7067406600f00cdd530d4bd1f34adfcf371f1a185288c14cd863ff501ee9b944ba7c81b93051f5456716e56cef939eb735aca7f8decf43c03e457520581834a7e277c13dff25f4e3ddc5172e2d246e01a754f3508425b4e566b8cf49612f869e5a86a3abf51f7f0fb1c2e89046e4be383a91983c60e507738a5b205f0a8893642a6f5845677e44f11bd179151db6f6aa196bd4888bd1ff8e95cb5bbaa08a22a93b767a54b82c8a0b8a765d6b020c884c0c16234113b3dc46848f4b46f2a4f276dc83b48f6f3a43545cdf807d7134f886595988beee96cc9bf38f84cba841a14533c2cb468507649f81594e44601f699ed3031ad78a1626d8d173e4e75afcf2278bda157632cf10ed27b08a738b192867bd1396f3a9ea0268dbbe7c8304aee1cc69bd63186fe4f080f2d92584e5e034380dd3ad3b7e93f44efebda5e3461ea4c9beb709550afbeac7f782fc3873485d34de357f5e35f823d70ea29ccdd4d77675d47e9d117b3d1c51b1417db51aeb658f53c58adb3736870a6993d11a6905571a9c98a25672e36fdfd1c4e55bb7d4fb6295b3ba5fa5df366247de52cb22b4d7baf0c70b585478e437b3638025f5673d70e2e5be594a0fb4303467645a06525f09d0a636ed3726823bd3169e4c21e97c44aa475fec97bc8c05e479d3913692e6b396de6debce2db3e2545587523750fd0da7c0e3f0d018daaa212c6c488e0bb68b028420cd86c37060d5cd2c0579f0fc4f0eb39b91a9fcead3f08d592094f7001cd111a82af8c259d13317fc0f50104e0f600b28e180afdc5ced37bff7eeadda6330c34c8cb2ec604a6f64546591eed7cd51002750798453a240378cd41426f4cd9b1e9b7f4f42d576e459748f18b4a7ad95ee96ef9a3c8af4b4b1929c9ed42f1f0cd57fba2d2d7bee204effc1ae08bd8cc644908025b5a3ad2447e53e73ec7bddda56f1b9859ac214275f0d7ff090b67f0ee4178f7d085d4af082ace1557c0598f78591b479ca1e66f31df7aa3fc58a999a69e397d23f990c96f375a8d4b44ea6b3028dc76bdcada8d75e8ef0482d3dff1e6a67f8bccdbc49aeaf1028dc5afa388322159b1c5a2365207e976f541658c2a225c633806209f5ef21141faa6c67d9d2c3430accec5147b2710bca558d7d5a7559cf97c1c55e4d61b7e3a451f25681d22b51ade8e54f5eb53b7c2017584bad664b9ad6a2d8c431bd534caf62841563a767765a2089717a52caaa17ee3d8db1e13112456a51aab13561dc793ef980106af80606d48abd7cceda36787dd20d3df2b910fe4e217b7aacc63246e052d17b44d0999b7c107c9b30217f5886d0215a135ab526b1a871d1b7c32ce15766068afeacf593cd9a590f8c6d38c7cdba0c595e8261c8ea00d587f9c53761b096df27323dbf557a421e6bd17c4f2d7cd017e35a6e6232a6a13ef4872929b0a520e72ec72ac2bb71a1056fac2ed5058f1acbdc1d427c5faad18b58cc85d99dc2b3202869d913fd5a039edd0b8e6d350826b0112132afdac659f236c08603415d3b401338e3459ec475a8b2a3e8091bf54ffffe42b61c21c5c38f708a22830b2ccde34e328618209a13389affea58c6a05fd4241642f920560a5d6207aceb3f0fef595ec28a5c0b07c422ddc931712d898c09e11b93d986b5b0e7aab48ed1242557353d013e45c2ebae6ceadf012bc435b71f237b6b21121fcfb2bdd2bcf6947f7a9ebc79afd90468871e552a2b534496fe139b78959b90d0588f0ec01f0ad69bfdd9182edd3c8ef566eff6d6f886e56a6d23a66bc2bee50a1ef043b2b7bac21af8adf1394b27e7cd68b6665394a919405ba0f612dfba40c3ceebf5f259102a8295b2c261aff6f62ac9377f75c43019634d4dbb924c70e53cf31035d0813642e956cd6414aef91ab67302ca944e764c6e9b3a5f7e9fdc026b80be5662b311e675ef8783205751387ce928b0ef2292d72284908673f8b99983a40928bc130903320738a7e7594dc60da8510fd4127640cc8c49cfb892211ed065118395acd5c31fdf0edc0d6c40c26b050e9de631afe87d71059b889b15e89aafe02a3e2bb08e494b1bc78bf2c5419c914a05877dd4e4d10c2b7fee8cf44455123953b707a4923e170f7e937e9b6f1b8dd45de9f69787a9a83acbd13fdb8bb071e09cbc083f66383be96877045d3bf687b92064321040933b53c14bee72d98f3e396e2a8076018046e59ea2087287db1cde78632a20dee48eee1045c377e0f6ff503144ac26e1b042747ff851a1eb285b5ee1b120aeb312013928d276e1a0bcf56889f3befe1b6d56c90289415b4da371f06b8537b8a10041cba5c59cb7fc0a0841f535c9c0558b42adfa6087f6139c218115b62a48122ae31959d997341420ffdf1195d754d37c0ca082b2fe30e6937818b46c9ec7ca121fdd5192298e0686fb7699bf693cdbb661bf3721a0bcaffcd34adf1596f250ed1d6f320a84121c4cf9f452b173bce3d32b6aed094a97fc0878f0028529352e1e47f82a116d055120023889ecbb1bbcdfdee63c0a1702c6391c5bbf9de7cd741e575f64d398177d0aa8448cdd5bc68fba32f7cc7025f2da60ae94649a7dc40cff93e25e333e9942df6a2b9e976d01bcdbbea61dee82516d46e6f5272acb91904ed3e9df42b637ac09189e11996be3c8acc0f27374fa5dae08735bbc1e9dd83f770d4cdce143821e1b8f66e2c596623a36b3042d54bc92e1c64188b6b966e223a2d8fd3f46d06c3307ac575296ed6d3269f8472d08d3b2eb8722ca73600c24c36eb76c1e218e009b6752cf7a677e853db999a3fea8e4620befaeab65bb52415e6047e73330db393f5305fc07f31f9a245826c4578c574b20c59d09c96428b389701cfb237f2b6968621afc85ae5aec550e2d240597523071562e9f1eba9ba3982ee47a6ed71f009c7619479aeb4e7616bf3a1fea5799dab40f55aecc09b23f989be5b1e658656948ed9a024b6c3f0f02230f1276ddcfaeb4d0b4c714952ff5aa65158a785dc90d01de2782b2306932c9cc373b61e4a0f12d34c3390343a9ab760300823e62e6d3ecec42e1853c949e58855caceee453cb5d3bf908ca0ce57446c925c449f0cc9d89e11772cd63e04793661658f591e8bc948e668e087244a18034a3201aa3e9736ee0f0acbe325e28911938b9f5607cdca30d57be55b2201f857e853f699b5fe06c1331a3e12f7ca7cda00e4147ba26efd561d51ab2313c31c40771809eeec06b6b1fa4af9fa0b9", 0x1000}, {&(0x7f0000001cc0)="96119ead21b012fce17ace68247625ff74ec7eb72e2658b66dccc85f87f7775af9ee1c9c0e94cffc70c1f95c31dd9e", 0x2f}], 0x3, &(0x7f0000001d40)=[{0x28, 0x109, 0x100000001, "c306d3bb31f06172c0dd9c8775a16d2e4a1b3a"}], 0x28, 0x810}, 0x40) 2018/04/05 10:23:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000580)={0x0, 0x0}) close(r1) sendmsg(r0, &(0x7f0000000500)={&(0x7f00000000c0)=@llc={0x1a, 0x6, 0xffff, 0x1, 0x3, 0xfff, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000140)="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", 0xfb}, {&(0x7f0000000000)="9d8b4116f3a9d4b02d51854558c99ea1d44c5ae2", 0x14}, {&(0x7f0000000280)="cd9daece9dcc13ba1204c4adfdde98afda31665f8f7b2ecf2db707658fe8a07bd843180bf2896e06cbbe3ecea2b1da3a9ef6c889e630bad01fcc104ec364797ae8ed83bfc3c0e95ff96223fc4b54f8ed033fd6f13b3e46", 0x57}, {&(0x7f0000000300)="5b247cfdcca260c2b723be21684b3d8fa50660fe93df70d4bce85d10c19af5421fa33fdc694271e60f8be33aa84a6ed45696a3a0f7903d18c659d10d06a756062f3264d88185867cfd447908fa62005996f6e5e328dc74671e35f81d1ffa29ad", 0x60}, {&(0x7f0000000380)="680b9875b9ed26a92173", 0xa}, {&(0x7f00000003c0)="c58423e617ce6c4b03f9973a3d5b2587c107616b68da264ff8cecbc144c5b4aef0c6ce4408d6a0c8bd848c6cc75ac105b00d7449ccf86b865d5ffa5e32f9e5851f5fb165da1f151316b93f5e8c6b2441b428414ee0e721c27bd0a9e86e9d434be0bb014053b72477000b1f6253f2", 0x6e}, {&(0x7f0000000440)="6ce31de06a6bb1abd6589bcd41d8fe8ec40985740c1bb5c8cd3b1c8803663ec3ea0097", 0x23}], 0x7, 0x0, 0x0, 0x4}, 0x8050) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:23:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 442.380800] FAULT_INJECTION: forcing a failure. [ 442.380800] name failslab, interval 1, probability 0, space 0, times 0 [ 442.392120] CPU: 0 PID: 31532 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 442.398966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.408327] Call Trace: [ 442.410930] dump_stack+0x1b9/0x29f [ 442.414573] ? arch_local_irq_restore+0x52/0x52 [ 442.419255] ? __save_stack_trace+0x7e/0xd0 [ 442.423601] should_fail.cold.4+0xa/0x1a [ 442.427679] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 442.432789] ? kasan_kmalloc+0xc4/0xe0 [ 442.436689] ? kmem_cache_alloc_trace+0x152/0x780 [ 442.441548] ? __memcg_init_list_lru_node+0x17c/0x2c0 [ 442.446753] ? __list_lru_init+0x45e/0x7b0 [ 442.451002] ? sget_userns+0x706/0xf20 [ 442.454898] ? mount_ns+0x8f/0x1d0 [ 442.458448] ? graph_lock+0x170/0x170 [ 442.462264] ? do_mount+0x564/0x3070 [ 442.465983] ? ksys_mount+0x12d/0x140 [ 442.469789] ? SyS_mount+0x35/0x50 [ 442.473338] ? do_syscall_64+0x29e/0x9d0 [ 442.477413] ? find_held_lock+0x36/0x1c0 2018/04/05 10:23:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x2c) 2018/04/05 10:23:06 executing program 2: socketpair(0x15, 0x5, 0x8000016e, &(0x7f00000001c0)) [ 442.481491] ? __lock_is_held+0xb5/0x140 [ 442.485574] ? check_same_owner+0x320/0x320 [ 442.489909] ? rcu_note_context_switch+0x710/0x710 [ 442.494853] should_failslab+0x124/0x180 [ 442.498929] kmem_cache_alloc_trace+0x2cb/0x780 [ 442.503734] ? __kmalloc_node+0x33/0x70 [ 442.507731] ? __kmalloc_node+0x33/0x70 [ 442.511720] ? rcu_read_lock_sched_held+0x108/0x120 [ 442.516757] __memcg_init_list_lru_node+0x17c/0x2c0 [ 442.521789] ? list_lru_add+0x850/0x850 [ 442.525864] ? __kmalloc_node+0x47/0x70 [ 442.529855] __list_lru_init+0x45e/0x7b0 [ 442.533931] ? list_lru_destroy+0x4c0/0x4c0 [ 442.538263] ? __raw_spin_lock_init+0x1c/0x100 [ 442.542860] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 442.547893] ? lockdep_init_map+0x9/0x10 [ 442.551967] sget_userns+0x706/0xf20 [ 442.555682] ? set_anon_super+0x20/0x20 [ 442.559666] ? get_empty_filp.cold.7+0x3e/0x3e [ 442.564258] ? destroy_unused_super.part.9+0x100/0x100 [ 442.569549] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 442.574576] ? kasan_check_read+0x11/0x20 [ 442.578736] ? rcu_pm_notify+0xc0/0xc0 [ 442.582895] ? trace_hardirqs_off+0xd/0x10 [ 442.587142] ? cap_capable+0x1f9/0x260 [ 442.591041] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.596588] ? security_capable+0xa4/0xd0 [ 442.600750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.606299] ? ns_capable_common+0x13f/0x170 [ 442.610723] mount_ns+0x8f/0x1d0 [ 442.614093] ? rpc_pipe_release+0xb70/0xb70 [ 442.618428] rpc_mount+0x9e/0xd0 [ 442.621806] mount_fs+0xae/0x328 [ 442.625185] vfs_kern_mount.part.34+0xd4/0x4d0 [ 442.629773] ? may_umount+0xb0/0xb0 [ 442.633403] ? _raw_read_unlock+0x22/0x30 [ 442.637815] ? __get_fs_type+0x97/0xc0 [ 442.641717] do_mount+0x564/0x3070 [ 442.645263] ? do_raw_spin_unlock+0x9e/0x2e0 [ 442.649679] ? copy_mount_string+0x40/0x40 [ 442.653921] ? rcu_pm_notify+0xc0/0xc0 [ 442.657824] ? copy_mount_options+0x5f/0x380 [ 442.662241] ? rcu_read_lock_sched_held+0x108/0x120 [ 442.667261] ? kmem_cache_alloc_trace+0x616/0x780 [ 442.672118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 442.677666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.683210] ? copy_mount_options+0x285/0x380 [ 442.687717] ksys_mount+0x12d/0x140 [ 442.691350] SyS_mount+0x35/0x50 [ 442.694717] ? ksys_mount+0x140/0x140 [ 442.698528] do_syscall_64+0x29e/0x9d0 [ 442.702418] ? vmalloc_sync_all+0x30/0x30 [ 442.706572] ? _raw_spin_unlock_irq+0x27/0x70 [ 442.711071] ? finish_task_switch+0x1ca/0x820 [ 442.715580] ? syscall_return_slowpath+0x5c0/0x5c0 [ 442.720519] ? syscall_return_slowpath+0x30f/0x5c0 [ 442.725463] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 442.730838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 442.735699] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 442.740893] RIP: 0033:0x4552d9 [ 442.744083] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 442.751810] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 442.759087] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 442.766372] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 442.773648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/05 10:23:06 executing program 2: socketpair(0x15, 0x5, 0x80008a00, &(0x7f00000001c0)) 2018/04/05 10:23:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 442.780942] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000020 2018/04/05 10:23:07 executing program 6 (fault-call:4 fault-nth:33): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can={0x0, 0x0}, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000280)={&(0x7f00000000c0)=@hci={0x1f, r2, 0x3}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)='U\vs', 0x3}], 0x1, &(0x7f00000001c0)=[{0x20, 0x118, 0x2, "90f1bbb25c68b6166ca6b3"}, {0x18, 0x11f, 0xed, "ce5fa0"}, {0x10, 0x108, 0x5}], 0x48, 0x20000000}, 0x20000800) 2018/04/05 10:23:07 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c65308c", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:07 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x2c) 2018/04/05 10:23:07 executing program 2: socketpair(0x15, 0x5, 0x8000a300, &(0x7f00000001c0)) 2018/04/05 10:23:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 443.871470] FAULT_INJECTION: forcing a failure. [ 443.871470] name failslab, interval 1, probability 0, space 0, times 0 [ 443.883098] CPU: 1 PID: 31582 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 443.890123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.899482] Call Trace: [ 443.902089] dump_stack+0x1b9/0x29f [ 443.905737] ? arch_local_irq_restore+0x52/0x52 [ 443.910425] ? __kmalloc+0x14e/0x760 [ 443.914150] ? register_shrinker+0x121/0x300 [ 443.918569] ? sget_userns+0xc78/0xf20 [ 443.922468] ? mount_ns+0x8f/0x1d0 [ 443.926018] ? rpc_mount+0x9e/0xd0 [ 443.929572] should_fail.cold.4+0xa/0x1a [ 443.933643] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 443.938762] ? graph_lock+0x170/0x170 [ 443.942583] ? find_held_lock+0x36/0x1c0 [ 443.946661] ? __lock_is_held+0xb5/0x140 [ 443.950745] ? check_same_owner+0x320/0x320 [ 443.955078] ? down_read+0x1b0/0x1b0 [ 443.958799] ? rcu_note_context_switch+0x710/0x710 [ 443.963736] ? register_shrinker+0x121/0x300 [ 443.968157] should_failslab+0x124/0x180 [ 443.972237] kmem_cache_alloc+0x2af/0x760 [ 443.976396] ? rpc_i_callback+0x30/0x30 [ 443.980375] rpc_alloc_inode+0x1a/0x20 [ 443.984274] alloc_inode+0x63/0x190 [ 443.987917] new_inode_pseudo+0x69/0x1a0 [ 443.991995] ? prune_icache_sb+0x1a0/0x1a0 [ 443.996239] ? kasan_check_read+0x11/0x20 [ 444.000399] ? rcu_is_watching+0x85/0x140 [ 444.004644] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 444.009847] new_inode+0x1c/0x40 [ 444.013223] rpc_get_inode+0x1e/0x1f0 [ 444.017044] rpc_fill_super+0x377/0xbb0 [ 444.021026] ? cap_capable+0x1f9/0x260 [ 444.024921] ? rpc_pipe_release+0xb70/0xb70 [ 444.029260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.034809] ? security_capable+0xa4/0xd0 [ 444.038970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.044520] ? ns_capable_common+0x13f/0x170 [ 444.048938] mount_ns+0x12a/0x1d0 [ 444.052393] ? rpc_pipe_release+0xb70/0xb70 [ 444.056723] rpc_mount+0x9e/0xd0 [ 444.060098] mount_fs+0xae/0x328 [ 444.063479] vfs_kern_mount.part.34+0xd4/0x4d0 [ 444.068075] ? may_umount+0xb0/0xb0 [ 444.071713] ? _raw_read_unlock+0x22/0x30 [ 444.075867] ? __get_fs_type+0x97/0xc0 [ 444.079763] do_mount+0x564/0x3070 [ 444.083313] ? copy_mount_string+0x40/0x40 [ 444.087557] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 444.092583] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 444.097355] ? retint_kernel+0x10/0x10 [ 444.101260] ? copy_mount_options+0x213/0x380 [ 444.105762] ? copy_mount_options+0x213/0x380 [ 444.110267] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.115814] ? copy_mount_options+0x285/0x380 [ 444.120322] ksys_mount+0x12d/0x140 [ 444.123956] SyS_mount+0x35/0x50 [ 444.127329] ? ksys_mount+0x140/0x140 [ 444.131136] do_syscall_64+0x29e/0x9d0 [ 444.135027] ? vmalloc_sync_all+0x30/0x30 [ 444.139181] ? _raw_spin_unlock_irq+0x27/0x70 [ 444.143677] ? finish_task_switch+0x1ca/0x820 [ 444.148178] ? syscall_return_slowpath+0x5c0/0x5c0 [ 444.153119] ? syscall_return_slowpath+0x30f/0x5c0 [ 444.158066] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 444.163452] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/05 10:23:07 executing program 2: socketpair(0x15, 0x5, 0x80000021, &(0x7f00000001c0)) 2018/04/05 10:23:07 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0xca4, 0x7fff, 0x9, 0x502bb78, 0x0, 0x101, 0x9069, 0xe, 0xa33, 0x4, 0x7fff, 0x0, 0x3, 0xffff, 0xfffffffffffffffd, 0x800, 0xffff, 0x0, 0x81, 0x1ff, 0x5, 0x400, 0x3f37, 0x784a, 0x100000000, 0x3ff, 0xffffffff80000000, 0x8, 0x0, 0x2, 0x1, 0x5, 0x4, 0x573, 0x1, 0x101, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x100, 0xfff, 0x1, 0x5, 0x7ff, 0x4, 0x2}, 0x0, 0xe, 0xffffffffffffff9c, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001d00)={0x6, 0xb, &(0x7f0000001c80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x3, 0x1, 0x7, 0x0, 0x1, 0xffffffff, 0x4}, @generic={0x5, 0x6, 0x100}, @jmp={0x5, 0x0, 0xf, 0xf, 0x4, 0xfffffff0, 0xfffffffffffffffc}, @ldst={0x0, 0x1, 0x3, 0x1, 0x9, 0xfffffffc, 0xfffffffffffffffc}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x8, 0x0, &(0x7f0000000300), 0x41100, 0x1}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001e80)={r1, 0x0, 0x5e, 0x41, &(0x7f0000001d80)="06963fd19e3801e311480c0b41dd0118cb0b7952e2104c7d15f7a6cf3cf293b15fe502b0e6683b54b035946a6a26b69923140b70820edcd9f46ffdc824dd845ebaf0d12cdff9966aa42d8118c031cbc34f311bf176494c4a90c822e9dc5d", &(0x7f0000001e00)=""/65, 0x0, 0x5}, 0x28) r2 = perf_event_open(&(0x7f0000001c00)={0x7, 0x70, 0x1, 0x2, 0x10000, 0x100000001, 0x0, 0x7ff, 0x8, 0x2, 0x1000, 0x8001, 0x2bf, 0x7, 0x40, 0x7ff, 0x40, 0xfffffffffffffffc, 0x3, 0x55a5, 0xfff, 0x8001, 0x1000, 0x0, 0x3, 0x2, 0x3, 0x6074, 0x9, 0x100000001, 0xec8a, 0x4, 0x200, 0x3, 0x7, 0x4, 0x70d4, 0x401, 0x0, 0x401, 0x6, @perf_config_ext={0x7, 0x8}, 0x0, 0xfeb, 0x7ff, 0x7, 0x81, 0x0, 0x9c}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r4) recvmsg(r3, &(0x7f0000001b40)={&(0x7f0000000340)=@hci={0x0, 0x0}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000003c0)=""/102, 0x66}, {&(0x7f0000000440)=""/209, 0xd1}, {&(0x7f0000000540)=""/238, 0xee}, {&(0x7f0000000640)=""/13, 0xd}, {&(0x7f0000000680)=""/107, 0x6b}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/207, 0xcf}, {&(0x7f0000001800)=""/249, 0xf9}, {&(0x7f0000001900)=""/238, 0xee}], 0x9, &(0x7f0000001ac0)=""/76, 0x4c, 0x2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x6, 0x6, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, @jmp={0x5, 0x2, 0x4, 0x7, 0x8, 0xfffffffe}, @ldst={0x3, 0x0, 0x1, 0x2, 0x7, 0xffffffc0, 0xffffffffffffffff}], &(0x7f00000000c0)='GPL\x00', 0x20080, 0xb9, &(0x7f0000000100)=""/185, 0x41000, 0x1, [], r5}, 0x48) recvmsg(r3, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:23:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x2c) 2018/04/05 10:23:07 executing program 0: r0 = socket$kcm(0x29, 0x6, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={&(0x7f00000000c0)=@in6={0xa, 0x4e21, 0x9, @loopback={0x0, 0x1}, 0x1}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000000)="4f2365da1520f701ca974e35b992d4c1c5becfc9e677041197f96c", 0x1b}], 0x1, &(0x7f0000001d40)=ANY=[@ANYBLOB="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"], 0xe8, 0x800}, 0x40) sendmsg(r0, &(0x7f0000001900)={&(0x7f0000000040)=@in={0x2, 0x4e21, @rand_addr=0x9}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000380)="4d88c3db89877c90e634916931f875d5d065964a03aade2c296ffb525b828dddc1318447f2c1064ca2e9f9a55ade28d15271e0bb4574e307a68468a122a007ae16fdd6ba1c5fba9087f22e9cec41957fe09dd8faaf17e6d0fa6613e487b2f3e5a1dfd432f0a24d4a91d8bc87c626f6a9f11d706ebdbcc113f33f8db123ce8b08918a2969a7693dbaf383da63d031b9a5339fa736f3f14674f683487e", 0x9c}, {&(0x7f0000000440)="bcebd8dc167f035eda54a150d949f0354e51d612fb76dea0b4c8edcbd9cc57d8e1fca41b6d72832ff7096ef9ee0dac58b8d4791d043edcb26882e8147db0abcb789d97cb5b5188679a93f0767afa791ec8ba9e5a7d", 0x55}, {&(0x7f00000004c0)="a81a24475f80fd34b9e919bab2a95d9a745c513bb92c8b864ef5f41d2f039f3605a3cbb34c0ea68a29fa406d1e9b50dcd76ba4eaf939e2ca60", 0x39}, {&(0x7f0000000500)="d62e46b1919fec7d78a2a985da19afc0b935a2d9ddfd9e984808f86de8a5d62a8bf743d272", 0x25}, {&(0x7f0000000540)="43b5a8d40f27822426109ff93b7f2c6ddaba29d05d0b8b01e8343a4cee7ba2cd6a0267d95e1e6abda464b2559f56708de3f9f3e3f80d609c5afd329b742efaaed851f22d3390bcacd08264b21951a64f2c225fcd3f943c3ac7e64e2ae2c74e6ea7af6d70b512b4b11aa4a7c2b94481e4d4cdd74d4a51c92b9a87d6c1f39ff4166ea2f4c807", 0x85}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="766d8d190c1a457b69ed729ca4b8a1e3c38a5b3f307d9c292608c37eadec172331f96e938e00e59e088eed25971d68112ea72e36c649d0735c158d146d0e5c46f9684f7918e23b3843d24371c80dfe295e483c862f33691b4dd1f77664cc31b4486facd5d473242e9ac00f08078bd92736beb70796bb4124180f2f5e834ea59390824ac43e074eb482512e8296958cfc565d10c7", 0x94}, {&(0x7f0000001940)="1c089a58264a3ceb19da381a88f69d3022c967038c39840c608ad4d36eddbe5c1f8843b747a1ae22e4c1e6955d74fff5667264c0540af02f70760e0574c646e33cd73c764ab49d057408f27247a3b74517f4db779c27a130acda000000f94384977954bd0f5ad732ea9540e96eb73abdef1bc2eb450faf7448a0b68fd0d200f17adb2fb82733b5435625ef8897527aebeeeb45d0d35cd2fd20c95aa15bb554c96f36831b760b9e6a87dd65811bc5246ba5e4c2ab05696620fa0b3094c0080536263858d4a50d4b0605aff5b87fbcbfea98e0e2d1092219eeffd0946d", 0x5d}, {&(0x7f0000001740)="a6f5d4875c2ac9ed2310393a5c87998b375d6635d49107b4a4ea201ef30c420cf5630b3fb551d8c611bddbd8c7a4ab0ae1e9a11eef6357628b858e621240c518bbeadab7111baf2efb4ee241014114cf3b11b0d4a9043db056787db8b6c6418d82b6dbe705b7fcb3e5abac27dc468d024061d4a2026dd80c4874eb541877688182f17d426e28eb9d24f7902a9edfc37a92a99968a412ad63a39f779257f040ddb5bcfd51fb540325a60e894bf61418fab405924c1613dc93a91eac3755e3c2c4aec4fa91ddb1b377146280ca3983b0bd3dd48fb7aa067fe247486c071bf334bdae364cbd8be79f42afac3ce744", 0xed}], 0x9, 0x0, 0x26, 0x5}, 0x8004) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00', r1}, 0x10) socketpair$unix(0x1, 0x205, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair$inet(0x2, 0xa, 0x8, &(0x7f0000000280)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000001bc0)={0x2, 0x70, 0x10001, 0x0, 0x513a, 0xeb, 0x0, 0xfffffffffffeffff, 0x1, 0xa, 0x800, 0x101, 0x400, 0x401, 0x3, 0x0, 0x0, 0x8, 0x3, 0x2, 0xffffffff, 0x101, 0x0, 0xfffffffffffffc36, 0x3f, 0xffff, 0xffff, 0x6, 0x7fffffff, 0x0, 0x8001, 0x5, 0x0, 0x8001, 0x6, 0x6, 0x800, 0x100, 0x0, 0x4, 0x7, @perf_config_ext, 0x8400, 0xdcc0, 0x3, 0x7, 0x657, 0x4, 0x10001}, 0xffffffffffffffff, 0xf, r3, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000001c40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001b00)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001b40)={&(0x7f0000001a80)='./file0\x00', r5}, 0x10) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001a40)={r2, r6}) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x80, &(0x7f0000000800), 0x0, &(0x7f00000001c0)=""/93, 0x5d}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001b80)) 2018/04/05 10:23:07 executing program 2: socketpair(0x15, 0x5, 0x80002101, &(0x7f00000001c0)) 2018/04/05 10:23:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x2c) [ 444.168318] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 444.173886] RIP: 0033:0x4552d9 [ 444.177072] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 444.184785] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 444.192057] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 444.199327] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 444.206598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 444.213871] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000021 2018/04/05 10:23:08 executing program 6 (fault-call:4 fault-nth:34): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:08 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:08 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:08 executing program 2: socketpair(0x15, 0x5, 0x800001c6, &(0x7f00000001c0)) 2018/04/05 10:23:08 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, 0x2c) 2018/04/05 10:23:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) socket$kcm(0x29, 0x5, 0x0) close(r0) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffff, 0x4, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f0000000100)="f540b996cc3a62b4af29095fabb44b36d238da87d7bb24a7b7edd5c37d7dc38d7a6726469b845b1d3fe13bf04cbdfcfb45324783a312f30125d768025c16ca12eb71ea452b6d0e37287c8816b6e7cc6c0aa53e19c6e7221bb514c6f5ae05616d3f06a8e69f1e1b19b5757c7b0287d307bfcace7ad38cd1b407e37e864fd61b8407ad71f53e2919fb1b3de5c16303b50fd9b6ce0c47fb2de4b25524be771f397855f404bd8603f1a680ca052070fc44400ec7d0d9630f51b8a66f62e3aa8ce8165d77ad5595", &(0x7f0000000200)="2c71f97bbafdef5b0854332d982f2460ec708a85932bafa472028dcafbf1b3068568bc5588735f748fcbaafd62d84313bc28ecf94395f4780ba14bba299827fd88a3b6841cae1c22d22b140e9d234f179a95156027a5676161cf9bc98b1c43e991a7241db5563b64bb972e1c1936cfa99f7537daea0152c60dee7e330d45d0b8906da21c9876392fab10e0586d688fe19e0305"}, 0x20) 2018/04/05 10:23:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 444.960150] FAULT_INJECTION: forcing a failure. [ 444.960150] name failslab, interval 1, probability 0, space 0, times 0 [ 444.971467] CPU: 0 PID: 31636 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 444.978317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.987944] Call Trace: [ 444.990548] dump_stack+0x1b9/0x29f [ 444.994194] ? arch_local_irq_restore+0x52/0x52 [ 444.998891] should_fail.cold.4+0xa/0x1a [ 445.002977] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 445.008093] ? __save_stack_trace+0x7e/0xd0 [ 445.012435] ? graph_lock+0x170/0x170 [ 445.016421] ? __raw_spin_lock_init+0x1c/0x100 [ 445.021020] ? find_held_lock+0x36/0x1c0 [ 445.025103] ? __lock_is_held+0xb5/0x140 [ 445.029190] ? check_same_owner+0x320/0x320 [ 445.033537] ? rcu_note_context_switch+0x710/0x710 [ 445.038502] should_failslab+0x124/0x180 [ 445.042585] kmem_cache_alloc+0x2af/0x760 [ 445.047014] ? lock_downgrade+0x8e0/0x8e0 [ 445.051189] __d_alloc+0xc1/0xc00 [ 445.054677] ? shrink_dcache_for_umount+0x290/0x290 2018/04/05 10:23:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 445.059710] ? mark_held_locks+0xc9/0x160 [ 445.063874] ? current_kernel_time64+0x242/0x2f0 [ 445.068647] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 445.073676] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 445.078705] ? current_kernel_time64+0x1f4/0x2f0 [ 445.083474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.090069] ? timespec_trunc+0xe7/0x170 [ 445.094148] ? put_itimerspec64+0x310/0x310 [ 445.098484] ? evict_inodes+0x5f0/0x5f0 [ 445.102474] ? rcu_is_watching+0x85/0x140 [ 445.106638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.112193] d_make_root+0x42/0x90 [ 445.115748] rpc_fill_super+0x37f/0xbb0 [ 445.119738] ? cap_capable+0x1f9/0x260 [ 445.123641] ? rpc_pipe_release+0xb70/0xb70 [ 445.128246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.133802] ? security_capable+0xa4/0xd0 [ 445.137968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.143641] ? ns_capable_common+0x13f/0x170 [ 445.148065] mount_ns+0x12a/0x1d0 [ 445.151522] ? rpc_pipe_release+0xb70/0xb70 [ 445.155847] rpc_mount+0x9e/0xd0 2018/04/05 10:23:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 445.159242] mount_fs+0xae/0x328 [ 445.162615] vfs_kern_mount.part.34+0xd4/0x4d0 [ 445.167207] ? may_umount+0xb0/0xb0 [ 445.170841] ? _raw_read_unlock+0x22/0x30 [ 445.175002] ? __get_fs_type+0x97/0xc0 [ 445.178909] do_mount+0x564/0x3070 [ 445.182462] ? copy_mount_string+0x40/0x40 [ 445.186703] ? rcu_pm_notify+0xc0/0xc0 [ 445.190607] ? copy_mount_options+0x5f/0x380 [ 445.195022] ? rcu_read_lock_sched_held+0x108/0x120 [ 445.200049] ? kmem_cache_alloc_trace+0x616/0x780 [ 445.204910] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 2018/04/05 10:23:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 445.210454] ? _copy_from_user+0xdf/0x150 [ 445.214617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.220162] ? copy_mount_options+0x285/0x380 [ 445.224672] ksys_mount+0x12d/0x140 [ 445.228306] SyS_mount+0x35/0x50 [ 445.231678] ? ksys_mount+0x140/0x140 [ 445.235487] do_syscall_64+0x29e/0x9d0 [ 445.239375] ? vmalloc_sync_all+0x30/0x30 [ 445.243531] ? _raw_spin_unlock_irq+0x27/0x70 [ 445.248033] ? finish_task_switch+0x1ca/0x820 [ 445.252536] ? syscall_return_slowpath+0x5c0/0x5c0 [ 445.258076] ? syscall_return_slowpath+0x30f/0x5c0 [ 445.263019] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 445.268393] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 445.273249] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 445.278438] RIP: 0033:0x4552d9 [ 445.281627] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 445.289344] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 445.296613] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 445.303891] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 445.311164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 445.318441] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000022 2018/04/05 10:23:09 executing program 6 (fault-call:4 fault-nth:35): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:09 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:09 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x2c) 2018/04/05 10:23:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:23:09 executing program 2: socketpair(0x15, 0x5, 0x800001ba, &(0x7f00000001c0)) 2018/04/05 10:23:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 446.415648] FAULT_INJECTION: forcing a failure. [ 446.415648] name failslab, interval 1, probability 0, space 0, times 0 [ 446.426970] CPU: 1 PID: 31689 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 446.433819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.443179] Call Trace: [ 446.445780] dump_stack+0x1b9/0x29f [ 446.449415] ? arch_local_irq_restore+0x52/0x52 [ 446.454097] ? __kmalloc+0x14e/0x760 [ 446.457816] ? register_shrinker+0x121/0x300 [ 446.462233] ? sget_userns+0xc78/0xf20 [ 446.466127] ? mount_ns+0x8f/0x1d0 [ 446.469665] ? rpc_mount+0x9e/0xd0 [ 446.473219] should_fail.cold.4+0xa/0x1a [ 446.477297] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 446.482413] ? graph_lock+0x170/0x170 [ 446.486227] ? find_held_lock+0x36/0x1c0 [ 446.490310] ? __lock_is_held+0xb5/0x140 [ 446.494395] ? check_same_owner+0x320/0x320 [ 446.498725] ? down_read+0x1b0/0x1b0 [ 446.502449] ? rcu_note_context_switch+0x710/0x710 [ 446.507387] ? register_shrinker+0x121/0x300 [ 446.511808] should_failslab+0x124/0x180 [ 446.515881] kmem_cache_alloc+0x2af/0x760 [ 446.520046] ? rpc_i_callback+0x30/0x30 [ 446.524034] rpc_alloc_inode+0x1a/0x20 [ 446.527936] alloc_inode+0x63/0x190 [ 446.531589] new_inode_pseudo+0x69/0x1a0 [ 446.535662] ? prune_icache_sb+0x1a0/0x1a0 [ 446.539908] ? kasan_check_read+0x11/0x20 [ 446.544848] ? rcu_is_watching+0x85/0x140 [ 446.549008] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 446.554210] new_inode+0x1c/0x40 [ 446.557587] rpc_get_inode+0x1e/0x1f0 [ 446.561398] rpc_fill_super+0x377/0xbb0 [ 446.565381] ? cap_capable+0x1f9/0x260 [ 446.569284] ? rpc_pipe_release+0xb70/0xb70 [ 446.573616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.579163] ? security_capable+0xa4/0xd0 [ 446.583328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.588875] ? ns_capable_common+0x13f/0x170 [ 446.593298] mount_ns+0x12a/0x1d0 [ 446.596845] ? rpc_pipe_release+0xb70/0xb70 [ 446.601173] rpc_mount+0x9e/0xd0 [ 446.604552] mount_fs+0xae/0x328 [ 446.607930] vfs_kern_mount.part.34+0xd4/0x4d0 [ 446.612520] ? may_umount+0xb0/0xb0 [ 446.616155] ? _raw_read_unlock+0x22/0x30 [ 446.620309] ? __get_fs_type+0x97/0xc0 [ 446.624209] do_mount+0x564/0x3070 [ 446.627765] ? do_raw_spin_unlock+0x9e/0x2e0 [ 446.632183] ? copy_mount_string+0x40/0x40 [ 446.636424] ? rcu_pm_notify+0xc0/0xc0 [ 446.640321] ? copy_mount_options+0x5f/0x380 [ 446.644735] ? rcu_read_lock_sched_held+0x108/0x120 [ 446.649764] ? kmem_cache_alloc_trace+0x616/0x780 [ 446.654620] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 446.660167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.665710] ? copy_mount_options+0x285/0x380 [ 446.670218] ksys_mount+0x12d/0x140 [ 446.673855] SyS_mount+0x35/0x50 [ 446.677226] ? ksys_mount+0x140/0x140 [ 446.681031] do_syscall_64+0x29e/0x9d0 [ 446.684921] ? vmalloc_sync_all+0x30/0x30 [ 446.689073] ? _raw_spin_unlock_irq+0x27/0x70 [ 446.693575] ? finish_task_switch+0x1ca/0x820 [ 446.698080] ? syscall_return_slowpath+0x5c0/0x5c0 [ 446.703020] ? syscall_return_slowpath+0x30f/0x5c0 [ 446.707964] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 446.713341] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 446.718200] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 446.723389] RIP: 0033:0x4552d9 [ 446.726576] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 446.734292] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 446.741566] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 446.748841] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 446.756115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/05 10:23:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:10 executing program 2: socketpair(0x15, 0x5, 0x80009e00, &(0x7f00000001c0)) 2018/04/05 10:23:10 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000003c0)=0x6, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffff9c, 0x50, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r2, 0x4) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0xffffffffffffff3a, &(0x7f0000000800), 0x0, &(0x7f0000000040)=""/93, 0x5d}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x0, 0x20, 0x2d, &(0x7f00000001c0)="62e845bf52543ec0a7a8c13e00b4873fa53ca76b97ba7417f93ddd52b9a6ffe9", &(0x7f0000000200)=""/45, 0x7ff, 0xfffffffffffffe40}, 0x28) r4 = getpid() socketpair(0xf, 0x3, 0xfd0, &(0x7f0000000340)={0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000380)) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x5, 0x8bb9, 0x401, 0x6, 0x0, 0x7, 0x88002, 0x3, 0x2, 0x8, 0xae5, 0x0, 0x3bd6, 0xd2, 0x1, 0x4, 0x5, 0x600, 0x8, 0x1ff, 0x2, 0x100000001, 0x2, 0x89c, 0x0, 0x3f, 0x100000000, 0xa7, 0xffffffffffffa365, 0x10001, 0x7fffffff, 0x7, 0x8b8, 0x500000, 0x4, 0x5, 0x0, 0x7c, 0x2, @perf_config_ext={0x2, 0xa8}, 0x0, 0x7e, 0x4, 0x2, 0x100000001, 0x1000000000000000, 0x101}, r4, 0xf, r5, 0x8) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000180)) 2018/04/05 10:23:10 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x2c) 2018/04/05 10:23:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:10 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0xd00]}, 0x2c) 2018/04/05 10:23:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 446.763390] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000023 2018/04/05 10:23:10 executing program 6 (fault-call:4 fault-nth:36): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:23:10 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:10 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:10 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x2c) 2018/04/05 10:23:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:10 executing program 2: socketpair(0x15, 0x5, 0x80002600, &(0x7f00000001c0)) 2018/04/05 10:23:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 447.509312] FAULT_INJECTION: forcing a failure. [ 447.509312] name failslab, interval 1, probability 0, space 0, times 0 [ 447.520615] CPU: 0 PID: 31744 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 447.527474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.536838] Call Trace: [ 447.539442] dump_stack+0x1b9/0x29f [ 447.543088] ? arch_local_irq_restore+0x52/0x52 [ 447.547781] should_fail.cold.4+0xa/0x1a [ 447.551858] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 447.556974] ? __save_stack_trace+0x7e/0xd0 [ 447.561312] ? graph_lock+0x170/0x170 [ 447.565130] ? __raw_spin_lock_init+0x1c/0x100 [ 447.570422] ? find_held_lock+0x36/0x1c0 [ 447.574591] ? __lock_is_held+0xb5/0x140 [ 447.578687] ? check_same_owner+0x320/0x320 [ 447.583028] ? rcu_note_context_switch+0x710/0x710 [ 447.587975] should_failslab+0x124/0x180 [ 447.592047] kmem_cache_alloc+0x2af/0x760 [ 447.596208] ? lock_downgrade+0x8e0/0x8e0 [ 447.600368] __d_alloc+0xc1/0xc00 [ 447.603832] ? shrink_dcache_for_umount+0x290/0x290 2018/04/05 10:23:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:23:11 executing program 2: socketpair(0x15, 0x5, 0x80000700, &(0x7f00000001c0)) 2018/04/05 10:23:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x2c) 2018/04/05 10:23:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 447.608856] ? mark_held_locks+0xc9/0x160 [ 447.613012] ? current_kernel_time64+0x242/0x2f0 [ 447.617782] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 447.622812] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 447.627842] ? current_kernel_time64+0x1f4/0x2f0 [ 447.632623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.638173] ? timespec_trunc+0xe7/0x170 [ 447.642247] ? put_itimerspec64+0x310/0x310 [ 447.646583] ? evict_inodes+0x5f0/0x5f0 [ 447.650579] ? rcu_is_watching+0x85/0x140 [ 447.654743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.660298] d_make_root+0x42/0x90 [ 447.663851] rpc_fill_super+0x37f/0xbb0 [ 447.667838] ? cap_capable+0x1f9/0x260 [ 447.671737] ? rpc_pipe_release+0xb70/0xb70 [ 447.676070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.681617] ? security_capable+0xa4/0xd0 [ 447.685774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.691322] ? ns_capable_common+0x13f/0x170 [ 447.695747] mount_ns+0x12a/0x1d0 [ 447.699204] ? rpc_pipe_release+0xb70/0xb70 [ 447.703538] rpc_mount+0x9e/0xd0 [ 447.706912] mount_fs+0xae/0x328 2018/04/05 10:23:11 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x2c) 2018/04/05 10:23:11 executing program 2: socketpair(0x15, 0x5, 0x80002001, &(0x7f00000001c0)) [ 447.710293] vfs_kern_mount.part.34+0xd4/0x4d0 [ 447.714883] ? may_umount+0xb0/0xb0 [ 447.718520] ? _raw_read_unlock+0x22/0x30 [ 447.722679] ? __get_fs_type+0x97/0xc0 [ 447.726579] do_mount+0x564/0x3070 [ 447.730123] ? do_raw_spin_unlock+0x9e/0x2e0 [ 447.734540] ? copy_mount_string+0x40/0x40 [ 447.738784] ? rcu_pm_notify+0xc0/0xc0 [ 447.742693] ? copy_mount_options+0x5f/0x380 [ 447.747111] ? rcu_read_lock_sched_held+0x108/0x120 [ 447.752136] ? kmem_cache_alloc_trace+0x616/0x780 [ 447.757078] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 447.762627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.768175] ? copy_mount_options+0x285/0x380 [ 447.772691] ksys_mount+0x12d/0x140 [ 447.776335] SyS_mount+0x35/0x50 [ 447.779710] ? ksys_mount+0x140/0x140 [ 447.783524] do_syscall_64+0x29e/0x9d0 [ 447.787416] ? vmalloc_sync_all+0x30/0x30 [ 447.791835] ? _raw_spin_unlock_irq+0x27/0x70 [ 447.796353] ? finish_task_switch+0x1ca/0x820 [ 447.800871] ? syscall_return_slowpath+0x5c0/0x5c0 [ 447.805824] ? syscall_return_slowpath+0x30f/0x5c0 2018/04/05 10:23:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 447.810773] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 447.816158] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 447.821033] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 447.826228] RIP: 0033:0x4552d9 [ 447.829417] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 447.837131] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 447.844924] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 447.852198] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 447.859469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 447.866744] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000024 2018/04/05 10:23:12 executing program 6 (fault-call:4 fault-nth:37): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:12 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:12 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:12 executing program 2: socketpair(0x15, 0x5, 0x8000000b, &(0x7f00000001c0)) 2018/04/05 10:23:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, 0x2c) 2018/04/05 10:23:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) r2 = perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x5, 0x10001, 0x4, 0x9, 0x0, 0x40, 0x22001, 0xd, 0x8000, 0x400, 0x5, 0xc64, 0x8, 0x7, 0x4, 0x1, 0x7fcf, 0x2, 0x5, 0x0, 0x5, 0x9, 0xb0bb, 0x10001, 0xd9c6, 0x7, 0x5, 0x0, 0x80000000, 0x9, 0x4700, 0x1, 0x89, 0x6, 0x1, 0xffff, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x9000, 0x7ca9, 0x1, 0x2, 0x100, 0x8, 0x400}, 0x0, 0x3, 0xffffffffffffffff, 0x55d43f05150f7850) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) [ 448.781812] FAULT_INJECTION: forcing a failure. [ 448.781812] name failslab, interval 1, probability 0, space 0, times 0 [ 448.793570] CPU: 1 PID: 31797 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 448.800425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.809784] Call Trace: [ 448.812387] dump_stack+0x1b9/0x29f [ 448.816034] ? arch_local_irq_restore+0x52/0x52 [ 448.820729] should_fail.cold.4+0xa/0x1a [ 448.824805] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 448.829932] ? graph_lock+0x170/0x170 [ 448.833756] ? debug_check_no_locks_freed+0x310/0x310 [ 448.838965] ? find_held_lock+0x36/0x1c0 [ 448.843049] ? __lock_is_held+0xb5/0x140 [ 448.847138] ? check_same_owner+0x320/0x320 [ 448.851475] ? rcu_note_context_switch+0x710/0x710 [ 448.856420] ? lock_downgrade+0x8e0/0x8e0 [ 448.860589] should_failslab+0x124/0x180 [ 448.864751] kmem_cache_alloc+0x2af/0x760 [ 448.868920] __d_alloc+0xc1/0xc00 [ 448.872396] ? shrink_dcache_for_umount+0x290/0x290 [ 448.877438] ? d_alloc_parallel+0x1e80/0x1e80 [ 448.881957] ? lock_release+0xa10/0xa10 [ 448.885950] ? mark_held_locks+0xc9/0x160 [ 448.890115] ? d_lookup+0x254/0x330 [ 448.893755] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 448.898777] ? d_lookup+0x219/0x330 [ 448.902939] d_alloc+0x8e/0x370 [ 448.906229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.911778] ? __d_alloc+0xc00/0xc00 [ 448.915516] ? full_name_hash+0xc0/0x100 [ 448.919603] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 448.924891] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 448.929149] rpc_populate.constprop.16+0x99/0x390 [ 448.934023] rpc_fill_super+0x3c9/0xbb0 [ 448.938006] ? cap_capable+0x1f9/0x260 [ 448.941907] ? rpc_pipe_release+0xb70/0xb70 [ 448.946243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.951788] ? security_capable+0xa4/0xd0 [ 448.956121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.961667] ? ns_capable_common+0x13f/0x170 [ 448.966091] mount_ns+0x12a/0x1d0 [ 448.969553] ? rpc_pipe_release+0xb70/0xb70 [ 448.973886] rpc_mount+0x9e/0xd0 [ 448.977265] mount_fs+0xae/0x328 [ 448.980727] vfs_kern_mount.part.34+0xd4/0x4d0 [ 448.985320] ? may_umount+0xb0/0xb0 [ 448.988952] ? _raw_read_unlock+0x22/0x30 [ 448.993100] ? __get_fs_type+0x97/0xc0 [ 448.996997] do_mount+0x564/0x3070 [ 449.000549] ? copy_mount_string+0x40/0x40 [ 449.004790] ? rcu_pm_notify+0xc0/0xc0 [ 449.008691] ? copy_mount_options+0x5f/0x380 [ 449.013109] ? rcu_read_lock_sched_held+0x108/0x120 [ 449.018133] ? kmem_cache_alloc_trace+0x616/0x780 [ 449.022990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.028534] ? copy_mount_options+0x285/0x380 2018/04/05 10:23:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:12 executing program 2: socketpair(0x15, 0x5, 0x80000116, &(0x7f00000001c0)) 2018/04/05 10:23:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x2c) 2018/04/05 10:23:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}, 0x2c) 2018/04/05 10:23:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 449.033043] ksys_mount+0x12d/0x140 [ 449.036691] SyS_mount+0x35/0x50 [ 449.040076] ? ksys_mount+0x140/0x140 [ 449.043883] do_syscall_64+0x29e/0x9d0 [ 449.048031] ? vmalloc_sync_all+0x30/0x30 [ 449.052185] ? _raw_spin_unlock_irq+0x27/0x70 [ 449.056684] ? finish_task_switch+0x1ca/0x820 [ 449.061362] ? syscall_return_slowpath+0x5c0/0x5c0 [ 449.066293] ? syscall_return_slowpath+0x30f/0x5c0 [ 449.071228] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 449.076599] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/05 10:23:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xf, 0xf4, 0xfff, 0xcf84, 0x10}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) socketpair(0x6, 0xd, 0x9, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f00000000c0)) [ 449.081457] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 449.086646] RIP: 0033:0x4552d9 [ 449.089833] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 449.097549] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 449.104823] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 449.112097] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 449.119371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 449.126642] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000025 [ 449.180788] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:13 executing program 6 (fault-call:4 fault-nth:38): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:13 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:13 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x2c) 2018/04/05 10:23:13 executing program 2: socketpair(0x15, 0x5, 0x80007500, &(0x7f00000001c0)) 2018/04/05 10:23:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000980)=0xffffffff, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000009c0)={0x0, r3, 0x5, 0x3}, 0x14) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000940)={r1}) recvmsg(r2, &(0x7f0000000900)={&(0x7f0000000100)=@nl, 0x80, &(0x7f0000000740)=[{&(0x7f0000000280)=""/231, 0xe7}, {&(0x7f0000000180)=""/145, 0x91}, {&(0x7f0000000380)=""/59, 0x3b}, {&(0x7f00000003c0)=""/95, 0x5f}, {&(0x7f0000000440)=""/195, 0xc3}, {&(0x7f0000000540)=""/113, 0x71}, {&(0x7f0000000a00)=""/218, 0xda}, {&(0x7f00000006c0)=""/43, 0x2b}, {&(0x7f0000000700)=""/54, 0x36}], 0x9, &(0x7f0000000800)=""/200, 0xc8, 0xff}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000000c0)={r1}) socketpair(0x0, 0xf, 0x10000, &(0x7f00000005c0)={0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x1, 0x7, 0x10001, 0x9, 0x0, 0x1, 0x100, 0xb, 0x33677dc7, 0x2b5b, 0x9, 0x0, 0x694e, 0x4, 0xfffffffffffffffc, 0x80, 0x10001, 0x7f, 0x2, 0x1, 0x1, 0x4, 0x8, 0x597, 0x5, 0x40, 0x6, 0x100, 0x3, 0x101, 0x7, 0x6, 0x5, 0x101, 0xff, 0x2, 0x0, 0x7, 0x5, @perf_config_ext={0x1c}, 0x2, 0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffff9c, 0x9) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) 2018/04/05 10:23:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x2c) 2018/04/05 10:23:13 executing program 2: socketpair(0x15, 0x5, 0x80000011, &(0x7f00000001c0)) [ 449.854142] FAULT_INJECTION: forcing a failure. [ 449.854142] name failslab, interval 1, probability 0, space 0, times 0 [ 449.865499] CPU: 1 PID: 31846 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 449.872349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.881712] Call Trace: [ 449.884318] dump_stack+0x1b9/0x29f [ 449.887960] ? arch_local_irq_restore+0x52/0x52 [ 449.892642] ? graph_lock+0x170/0x170 [ 449.896464] should_fail.cold.4+0xa/0x1a 2018/04/05 10:23:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 449.900537] ? perf_trace_lock_acquire+0xe3/0x980 [ 449.905394] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 449.910512] ? perf_trace_lock+0x900/0x900 [ 449.914754] ? graph_lock+0x170/0x170 [ 449.918568] ? graph_lock+0x170/0x170 [ 449.922385] ? find_held_lock+0x36/0x1c0 [ 449.926462] ? __lock_is_held+0xb5/0x140 [ 449.930532] ? check_same_owner+0x320/0x320 [ 449.934843] ? rcu_note_context_switch+0x710/0x710 [ 449.939761] should_failslab+0x124/0x180 [ 449.943808] kmem_cache_alloc+0x2af/0x760 [ 449.947944] ? rpc_i_callback+0x30/0x30 [ 449.951902] rpc_alloc_inode+0x1a/0x20 [ 449.955778] alloc_inode+0x63/0x190 [ 449.959405] new_inode_pseudo+0x69/0x1a0 [ 449.963468] ? prune_icache_sb+0x1a0/0x1a0 [ 449.967691] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 449.972258] ? d_instantiate_no_diralias+0x240/0x240 [ 449.977354] ? kasan_check_write+0x14/0x20 [ 449.981587] ? do_raw_spin_lock+0xc1/0x200 [ 449.985819] new_inode+0x1c/0x40 [ 449.989172] rpc_get_inode+0x1e/0x1f0 [ 449.992954] ? d_drop+0x51/0x60 [ 449.996225] __rpc_create_common+0x5d/0x190 [ 450.000552] rpc_populate.constprop.16+0x11f/0x390 [ 450.005501] rpc_fill_super+0x3c9/0xbb0 [ 450.009488] ? cap_capable+0x1f9/0x260 [ 450.013382] ? rpc_pipe_release+0xb70/0xb70 [ 450.017713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.023264] ? security_capable+0xa4/0xd0 [ 450.027421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.032976] ? ns_capable_common+0x13f/0x170 [ 450.037395] mount_ns+0x12a/0x1d0 [ 450.040867] ? rpc_pipe_release+0xb70/0xb70 [ 450.045205] rpc_mount+0x9e/0xd0 [ 450.048586] mount_fs+0xae/0x328 2018/04/05 10:23:13 executing program 2: socketpair(0x15, 0x5, 0x8000018e, &(0x7f00000001c0)) [ 450.051965] vfs_kern_mount.part.34+0xd4/0x4d0 [ 450.056571] ? may_umount+0xb0/0xb0 [ 450.060205] ? _raw_read_unlock+0x22/0x30 [ 450.064360] ? __get_fs_type+0x97/0xc0 [ 450.068266] do_mount+0x564/0x3070 [ 450.071826] ? copy_mount_string+0x40/0x40 [ 450.076070] ? rcu_pm_notify+0xc0/0xc0 [ 450.079980] ? copy_mount_options+0x5f/0x380 [ 450.084395] ? rcu_read_lock_sched_held+0x108/0x120 [ 450.089423] ? kmem_cache_alloc_trace+0x616/0x780 [ 450.094277] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 450.099824] ? _copy_from_user+0xdf/0x150 2018/04/05 10:23:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:13 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x2c) [ 450.103987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.109537] ? copy_mount_options+0x285/0x380 [ 450.114047] ksys_mount+0x12d/0x140 [ 450.117684] SyS_mount+0x35/0x50 [ 450.121055] ? ksys_mount+0x140/0x140 [ 450.124864] do_syscall_64+0x29e/0x9d0 [ 450.128755] ? vmalloc_sync_all+0x30/0x30 [ 450.132914] ? _raw_spin_unlock_irq+0x27/0x70 [ 450.137418] ? finish_task_switch+0x1ca/0x820 [ 450.141924] ? syscall_return_slowpath+0x5c0/0x5c0 [ 450.146862] ? syscall_return_slowpath+0x30f/0x5c0 2018/04/05 10:23:13 executing program 2: socketpair(0x15, 0x5, 0x80000035, &(0x7f00000001c0)) [ 450.151815] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 450.157211] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 450.162075] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 450.167269] RIP: 0033:0x4552d9 [ 450.170463] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 450.178191] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 450.185475] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 450.192754] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 450.200555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 450.207831] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000026 [ 450.215291] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry mount [ 450.307524] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:14 executing program 6 (fault-call:4 fault-nth:39): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:14 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0c', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:14 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r1}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000023c0)={r4, r3}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x80, &(0x7f0000002380)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/152, 0x98}, {&(0x7f0000001380)=""/4096, 0x1000}], 0x3, &(0x7f0000000040)=""/93, 0x5d}, 0x2) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r5, 0x7, 0x1}, 0x14) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000000)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000200)) 2018/04/05 10:23:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x2c) 2018/04/05 10:23:14 executing program 2: socketpair(0x15, 0x5, 0x80000c00, &(0x7f00000001c0)) [ 451.097396] FAULT_INJECTION: forcing a failure. [ 451.097396] name failslab, interval 1, probability 0, space 0, times 0 [ 451.108721] CPU: 1 PID: 31895 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 451.115598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.124981] Call Trace: [ 451.127594] dump_stack+0x1b9/0x29f [ 451.131246] ? arch_local_irq_restore+0x52/0x52 [ 451.135938] should_fail.cold.4+0xa/0x1a [ 451.140016] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 451.145140] ? graph_lock+0x170/0x170 [ 451.148953] ? debug_check_no_locks_freed+0x310/0x310 [ 451.154154] ? find_held_lock+0x36/0x1c0 [ 451.158234] ? __lock_is_held+0xb5/0x140 [ 451.162321] ? check_same_owner+0x320/0x320 [ 451.166655] ? rcu_note_context_switch+0x710/0x710 [ 451.171594] ? lock_downgrade+0x8e0/0x8e0 [ 451.175765] should_failslab+0x124/0x180 [ 451.179841] kmem_cache_alloc+0x2af/0x760 [ 451.184021] __d_alloc+0xc1/0xc00 [ 451.187492] ? shrink_dcache_for_umount+0x290/0x290 [ 451.192525] ? d_alloc_parallel+0x1e80/0x1e80 2018/04/05 10:23:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:14 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}, 0x2c) 2018/04/05 10:23:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:14 executing program 2: socketpair(0x15, 0x5, 0x800000a9, &(0x7f00000001c0)) [ 451.197038] ? lock_release+0xa10/0xa10 [ 451.201228] ? mark_held_locks+0xc9/0x160 [ 451.205394] ? d_lookup+0x254/0x330 [ 451.209045] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 451.214077] ? d_lookup+0x219/0x330 [ 451.217713] d_alloc+0x8e/0x370 [ 451.221003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.226549] ? __d_alloc+0xc00/0xc00 [ 451.230276] ? full_name_hash+0xc0/0x100 [ 451.234358] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 451.239645] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 451.243905] rpc_populate.constprop.16+0x99/0x390 [ 451.248768] rpc_fill_super+0x3c9/0xbb0 [ 451.252758] ? cap_capable+0x1f9/0x260 [ 451.256657] ? rpc_pipe_release+0xb70/0xb70 [ 451.260991] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.266547] ? security_capable+0xa4/0xd0 [ 451.270703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.276254] ? ns_capable_common+0x13f/0x170 [ 451.280680] mount_ns+0x12a/0x1d0 [ 451.284157] ? rpc_pipe_release+0xb70/0xb70 [ 451.288494] rpc_mount+0x9e/0xd0 [ 451.291874] mount_fs+0xae/0x328 2018/04/05 10:23:14 executing program 2: socketpair(0x15, 0x5, 0x8000b301, &(0x7f00000001c0)) 2018/04/05 10:23:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 451.295258] vfs_kern_mount.part.34+0xd4/0x4d0 [ 451.299853] ? may_umount+0xb0/0xb0 [ 451.303493] ? _raw_read_unlock+0x22/0x30 [ 451.307645] ? __get_fs_type+0x97/0xc0 [ 451.311541] do_mount+0x564/0x3070 [ 451.315088] ? do_raw_spin_unlock+0x9e/0x2e0 [ 451.319508] ? copy_mount_string+0x40/0x40 [ 451.323751] ? rcu_pm_notify+0xc0/0xc0 [ 451.327660] ? copy_mount_options+0x5f/0x380 [ 451.332083] ? rcu_read_lock_sched_held+0x108/0x120 [ 451.337142] ? kmem_cache_alloc_trace+0x616/0x780 [ 451.341995] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 451.347545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.353096] ? copy_mount_options+0x285/0x380 [ 451.357609] ksys_mount+0x12d/0x140 [ 451.361253] SyS_mount+0x35/0x50 [ 451.364630] ? ksys_mount+0x140/0x140 [ 451.368442] do_syscall_64+0x29e/0x9d0 [ 451.372337] ? vmalloc_sync_all+0x30/0x30 [ 451.376494] ? _raw_spin_unlock_irq+0x27/0x70 [ 451.380998] ? finish_task_switch+0x1ca/0x820 [ 451.385504] ? syscall_return_slowpath+0x5c0/0x5c0 [ 451.390442] ? syscall_return_slowpath+0x30f/0x5c0 2018/04/05 10:23:14 executing program 2: socketpair(0x15, 0x5, 0x800001b3, &(0x7f00000001c0)) [ 451.395386] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 451.400768] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 451.405628] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 451.410825] RIP: 0033:0x4552d9 [ 451.414018] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 451.421736] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 451.429010] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 451.436285] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/04/05 10:23:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 451.443568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 451.450861] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000027 [ 451.460745] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:15 executing program 6 (fault-call:4 fault-nth:40): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x12, &(0x7f0000000100)=@raw=[@jmp={0x5, 0x7, 0x7, 0xf, 0x7, 0x100, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0xb, 0x6, 0x0, 0xfffffffe, 0xfffffffffffffff8}, @ldst={0x3, 0x43ae42bf695d4b54, 0x0, 0xb, 0x9, 0x0, 0xfffffffffffffffc}, @ldst={0x0, 0x3, 0x3, 0xd, 0xf, 0x42, 0x18}, @generic={0x9, 0x192cc367, 0x0, 0x20}, @initr0={0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x200}, @ldst={0x1, 0x48fcbfdf252ebc05, 0x7, 0x0, 0xb, 0x40, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x19}], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffff8, 0x3e, &(0x7f0000000200)=""/62, 0x40f00, 0x1}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x51, 0x7f, &(0x7f0000000300)="2492b4bcc24303e6183d9de35d85683c8acfe8ff55035d26688842d583e6c915241ab3186a5f8a59ae0dd787fcd027e44e63b8fa643a8c6071db53d39cf591674290e8c8b7c2cf1b3f63b504b176a04ae4", &(0x7f0000000380)=""/127, 0xd0, 0x78}, 0x28) socketpair$inet6(0xa, 0x807, 0xb6aa, &(0x7f0000000000)) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000440)) socketpair$inet6(0xa, 0x1, 0xfffffffffffffff7, &(0x7f00000000c0)) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='f2fs\x00', 0x20, &(0x7f0000000540)="7f7327c62ca2f45b8fbe8bc931b478e63218b96c99383522b9add0246dd9513271710d60a0209e30406a3fb8cd52cdf96ab1db7fa262bc84e83b5274462f66b25a4b93f25c94fbd212826df51c4fe70ae450e2fec6fcf4b7c865acf80cd6d0faf949605e5a6c8bd879bbd8cf68afa03a3247fb6f2e47b96eab738693d0ee21a049d6a5ac51b56ea769a28ff3a85bacec4d1e3d8c7fa93f1942812ce13cb4699ff6808ac735f45046ee6fe81bdb1e4b2a11ef64b265060d1e9703ec83b0487274bae31857ea5a5060739e8dc8ffc9165c2d9e78d40820f0bf29777f") 2018/04/05 10:23:15 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0l', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:15 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x2c) 2018/04/05 10:23:15 executing program 2: socketpair(0x15, 0x5, 0x8000018d, &(0x7f00000001c0)) 2018/04/05 10:23:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}, 0x2c) [ 452.197939] FAULT_INJECTION: forcing a failure. [ 452.197939] name failslab, interval 1, probability 0, space 0, times 0 [ 452.209251] CPU: 1 PID: 31957 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 452.216100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.225461] Call Trace: [ 452.228061] dump_stack+0x1b9/0x29f [ 452.231704] ? arch_local_irq_restore+0x52/0x52 [ 452.236383] ? graph_lock+0x170/0x170 [ 452.240199] should_fail.cold.4+0xa/0x1a 2018/04/05 10:23:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r1, &(0x7f0000001340)={&(0x7f00000000c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)=""/185, 0xb9}, {&(0x7f0000000000)=""/43, 0x2b}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/124, 0x7c}], 0x4, &(0x7f0000001300)=""/47, 0x2f, 0x115}, 0x40000120) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xd0c403a7ea98da5}, 0x0) [ 452.244272] ? perf_trace_lock_acquire+0xe3/0x980 [ 452.249129] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 452.254243] ? perf_trace_lock+0x900/0x900 [ 452.258488] ? graph_lock+0x170/0x170 [ 452.262298] ? graph_lock+0x170/0x170 [ 452.266111] ? find_held_lock+0x36/0x1c0 [ 452.270194] ? __lock_is_held+0xb5/0x140 [ 452.274286] ? check_same_owner+0x320/0x320 [ 452.278623] ? rcu_note_context_switch+0x710/0x710 [ 452.283570] should_failslab+0x124/0x180 [ 452.287644] kmem_cache_alloc+0x2af/0x760 [ 452.291813] ? rpc_i_callback+0x30/0x30 2018/04/05 10:23:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, 0x2c) 2018/04/05 10:23:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r0) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) [ 452.295798] rpc_alloc_inode+0x1a/0x20 [ 452.299693] alloc_inode+0x63/0x190 [ 452.303331] new_inode_pseudo+0x69/0x1a0 [ 452.307408] ? prune_icache_sb+0x1a0/0x1a0 [ 452.311656] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 452.316248] ? d_instantiate_no_diralias+0x240/0x240 [ 452.321368] ? kasan_check_write+0x14/0x20 [ 452.325614] ? do_raw_spin_lock+0xc1/0x200 [ 452.329862] new_inode+0x1c/0x40 [ 452.333233] rpc_get_inode+0x1e/0x1f0 [ 452.337044] ? d_drop+0x51/0x60 [ 452.340334] __rpc_create_common+0x5d/0x190 [ 452.344667] rpc_populate.constprop.16+0x11f/0x390 [ 452.349613] rpc_fill_super+0x3c9/0xbb0 [ 452.353598] ? cap_capable+0x1f9/0x260 [ 452.357494] ? rpc_pipe_release+0xb70/0xb70 [ 452.361829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.367373] ? security_capable+0xa4/0xd0 [ 452.371533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.377083] ? ns_capable_common+0x13f/0x170 [ 452.381503] mount_ns+0x12a/0x1d0 [ 452.384966] ? rpc_pipe_release+0xb70/0xb70 [ 452.389300] rpc_mount+0x9e/0xd0 [ 452.392674] mount_fs+0xae/0x328 2018/04/05 10:23:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x2c) 2018/04/05 10:23:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r0) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) socketpair(0xa, 0x7, 0x2660, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)=ANY=[@ANYBLOB="02000000000000000000000020000000"]) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r2, 0x3, 0x2}, 0x14) [ 452.396054] vfs_kern_mount.part.34+0xd4/0x4d0 [ 452.400648] ? may_umount+0xb0/0xb0 [ 452.404283] ? _raw_read_unlock+0x22/0x30 [ 452.408439] ? __get_fs_type+0x97/0xc0 [ 452.412341] do_mount+0x564/0x3070 [ 452.415891] ? do_raw_spin_unlock+0x9e/0x2e0 [ 452.420313] ? copy_mount_string+0x40/0x40 [ 452.424559] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 452.429585] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 452.434355] ? retint_kernel+0x10/0x10 [ 452.438528] ? copy_mount_options+0x1f0/0x380 [ 452.443034] ? copy_mount_options+0x1fa/0x380 2018/04/05 10:23:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}, 0x2c) [ 452.447536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.453087] ? copy_mount_options+0x285/0x380 [ 452.457597] ksys_mount+0x12d/0x140 [ 452.461235] SyS_mount+0x35/0x50 [ 452.464607] ? ksys_mount+0x140/0x140 [ 452.468416] do_syscall_64+0x29e/0x9d0 [ 452.472310] ? vmalloc_sync_all+0x30/0x30 [ 452.476464] ? _raw_spin_unlock_irq+0x27/0x70 [ 452.481090] ? finish_task_switch+0x1ca/0x820 [ 452.485604] ? syscall_return_slowpath+0x5c0/0x5c0 [ 452.490549] ? syscall_return_slowpath+0x30f/0x5c0 2018/04/05 10:23:16 executing program 0: close(0xffffffffffffffff) socketpair(0x11, 0x80002, 0xc9e, &(0x7f00000000c0)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) close(0xffffffffffffffff) [ 452.495489] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 452.500981] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 452.505838] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 452.511028] RIP: 0033:0x4552d9 [ 452.514215] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 452.521935] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 452.529206] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 452.536478] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 452.543754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 452.551028] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000028 [ 452.558497] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry mount [ 452.579428] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:16 executing program 6 (fault-call:4 fault-nth:41): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:23:16 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653004", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:16 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x2c) 2018/04/05 10:23:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:16 executing program 2: socketpair(0x15, 0x5, 0x8000e301, &(0x7f00000001c0)) [ 453.279160] FAULT_INJECTION: forcing a failure. [ 453.279160] name failslab, interval 1, probability 0, space 0, times 0 [ 453.290500] CPU: 0 PID: 32016 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 453.297351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.306712] Call Trace: [ 453.309311] dump_stack+0x1b9/0x29f [ 453.312953] ? arch_local_irq_restore+0x52/0x52 [ 453.317649] should_fail.cold.4+0xa/0x1a [ 453.321722] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 453.326838] ? graph_lock+0x170/0x170 [ 453.330654] ? debug_check_no_locks_freed+0x310/0x310 [ 453.335856] ? find_held_lock+0x36/0x1c0 [ 453.339934] ? __lock_is_held+0xb5/0x140 [ 453.344027] ? check_same_owner+0x320/0x320 [ 453.348362] ? rcu_note_context_switch+0x710/0x710 [ 453.353305] ? lock_downgrade+0x8e0/0x8e0 [ 453.357470] should_failslab+0x124/0x180 [ 453.361538] kmem_cache_alloc+0x2af/0x760 [ 453.365707] __d_alloc+0xc1/0xc00 [ 453.369170] ? shrink_dcache_for_umount+0x290/0x290 [ 453.374206] ? d_alloc_parallel+0x1e80/0x1e80 [ 453.378716] ? lock_release+0xa10/0xa10 [ 453.382703] ? mark_held_locks+0xc9/0x160 [ 453.386862] ? d_lookup+0x254/0x330 [ 453.390512] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 453.395531] ? d_lookup+0x219/0x330 [ 453.399168] d_alloc+0x8e/0x370 [ 453.402467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.408012] ? __d_alloc+0xc00/0xc00 [ 453.411735] ? full_name_hash+0xc0/0x100 [ 453.415816] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 453.421100] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 453.425354] rpc_populate.constprop.16+0x99/0x390 [ 453.430214] rpc_fill_super+0x3c9/0xbb0 [ 453.434220] ? cap_capable+0x1f9/0x260 [ 453.438117] ? rpc_pipe_release+0xb70/0xb70 [ 453.442453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.448000] ? security_capable+0xa4/0xd0 [ 453.452159] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.457709] ? ns_capable_common+0x13f/0x170 [ 453.462124] mount_ns+0x12a/0x1d0 [ 453.465582] ? rpc_pipe_release+0xb70/0xb70 [ 453.469923] rpc_mount+0x9e/0xd0 [ 453.473297] mount_fs+0xae/0x328 [ 453.476679] vfs_kern_mount.part.34+0xd4/0x4d0 [ 453.481269] ? may_umount+0xb0/0xb0 [ 453.484913] ? _raw_read_unlock+0x22/0x30 [ 453.489065] ? __get_fs_type+0x97/0xc0 [ 453.492964] do_mount+0x564/0x3070 [ 453.496515] ? copy_mount_string+0x40/0x40 [ 453.500760] ? rcu_pm_notify+0xc0/0xc0 [ 453.504662] ? copy_mount_options+0x5f/0x380 [ 453.509087] ? rcu_read_lock_sched_held+0x108/0x120 [ 453.514116] ? kmem_cache_alloc_trace+0x616/0x780 [ 453.518966] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 453.524513] ? _copy_from_user+0xdf/0x150 [ 453.528853] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.534395] ? copy_mount_options+0x285/0x380 [ 453.538905] ksys_mount+0x12d/0x140 [ 453.542539] SyS_mount+0x35/0x50 [ 453.546429] ? ksys_mount+0x140/0x140 [ 453.550235] do_syscall_64+0x29e/0x9d0 [ 453.554126] ? vmalloc_sync_all+0x30/0x30 [ 453.558282] ? _raw_spin_unlock_irq+0x27/0x70 [ 453.562782] ? finish_task_switch+0x1ca/0x820 [ 453.567283] ? syscall_return_slowpath+0x5c0/0x5c0 [ 453.572218] ? syscall_return_slowpath+0x30f/0x5c0 [ 453.577164] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 453.582535] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 453.587392] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 453.592580] RIP: 0033:0x4552d9 [ 453.595770] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 453.603482] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 453.610754] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 453.618024] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/04/05 10:23:16 executing program 2: socketpair(0x15, 0x5, 0x8000dc00, &(0x7f00000001c0)) 2018/04/05 10:23:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:16 executing program 0: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000240)={0x0, 0x0}) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000026c0)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000000c0)={r1}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) 2018/04/05 10:23:16 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x2c) 2018/04/05 10:23:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:16 executing program 2: socketpair(0x15, 0x5, 0x80000501, &(0x7f00000001c0)) 2018/04/05 10:23:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffff9c, 0x50, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r2, 0x4) 2018/04/05 10:23:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 453.625295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 453.632562] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000029 [ 453.677778] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:17 executing program 6 (fault-call:4 fault-nth:42): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:17 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:17 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653003", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:17 executing program 2: socketpair(0x15, 0x5, 0x80000134, &(0x7f00000001c0)) 2018/04/05 10:23:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:17 executing program 0: socketpair$unix(0x1, 0x200000000001, 0x0, &(0x7f0000000100)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r2, &(0x7f0000000180)="dc5a133269bca238e2dc8eb32d89e18c43a3f47418defc34bb26cfb618c2cf4eef80d357455124939bc79d864d0748bb868924ad59c86df9002ca413063e3d3bc74d76e06417087baf88ed11b90e2bb0a823aaabb989ebab8de01c3991711906d3f22a52e418d68a1fb38b759bbf31c28dfc6901bf", &(0x7f0000000200)=""/17}, 0x18) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='btrfs\x00', 0x200000, &(0x7f00000003c0)="c3c810f4239955a76df4fe721b4c1706b9a29a47270aba5a2061edc58d39c955d7166d7c5f561dd320bb") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x1000, 0xffffffff, 0x3, 0x10, r2}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', r2}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000014c0)={r3, &(0x7f0000000400)="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", &(0x7f0000001400)=""/147}, 0x18) 2018/04/05 10:23:17 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x2c) 2018/04/05 10:23:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 454.476893] FAULT_INJECTION: forcing a failure. [ 454.476893] name failslab, interval 1, probability 0, space 0, times 0 [ 454.488290] CPU: 0 PID: 32060 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 454.495147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.504513] Call Trace: [ 454.507125] dump_stack+0x1b9/0x29f [ 454.510772] ? arch_local_irq_restore+0x52/0x52 [ 454.515451] ? graph_lock+0x170/0x170 [ 454.519946] should_fail.cold.4+0xa/0x1a 2018/04/05 10:23:18 executing program 2: socketpair(0x15, 0x5, 0x8000012d, &(0x7f00000001c0)) 2018/04/05 10:23:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 454.524024] ? perf_trace_lock_acquire+0xe3/0x980 [ 454.528882] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 454.534002] ? perf_trace_lock+0x900/0x900 [ 454.538249] ? graph_lock+0x170/0x170 [ 454.542065] ? graph_lock+0x170/0x170 [ 454.545895] ? find_held_lock+0x36/0x1c0 [ 454.549969] ? __lock_is_held+0xb5/0x140 [ 454.554162] ? check_same_owner+0x320/0x320 [ 454.558502] ? rcu_note_context_switch+0x710/0x710 [ 454.563447] should_failslab+0x124/0x180 [ 454.567519] kmem_cache_alloc+0x2af/0x760 [ 454.571678] ? rpc_i_callback+0x30/0x30 2018/04/05 10:23:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0x2c) [ 454.575660] rpc_alloc_inode+0x1a/0x20 [ 454.579553] alloc_inode+0x63/0x190 [ 454.583192] new_inode_pseudo+0x69/0x1a0 [ 454.587268] ? prune_icache_sb+0x1a0/0x1a0 [ 454.591510] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 454.596100] ? d_instantiate_no_diralias+0x240/0x240 [ 454.601210] ? kasan_check_write+0x14/0x20 [ 454.605451] ? do_raw_spin_lock+0xc1/0x200 [ 454.609699] new_inode+0x1c/0x40 [ 454.613076] rpc_get_inode+0x1e/0x1f0 [ 454.616896] ? d_drop+0x51/0x60 [ 454.620284] __rpc_create_common+0x5d/0x190 2018/04/05 10:23:18 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x721bfadeaf4c98b4, 0x0) socketpair$inet(0x2, 0x7, 0x252, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000600)={&(0x7f00000004c0)=@nl=@kern={0x10, 0x0, 0x0, 0x80000}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)="f2134cb88edf6161ba223cbdf6c1e3d8f1f8a39ffb38b0a68d9035d49f49e209f8604b988a7a1a36124d9f7765ddf4f95ccfe109f0fdf3", 0x37}], 0x1, &(0x7f0000000540)=[{0xa0, 0x100, 0x401, "283485e04e45cbe55ef7c828f4720f98c0d385adbe0e511a0f17d756913191da37cde9cbb14de2293c2d52806c2d9854ab9c9eccb33c279fa0ed24ede3884916a103f931686e5a762d60894654f93a180bd2e7cd223de63c20dcca14a6a6735eac12bfa5a231aba4b4f4246eb8f607677eff3b13ffc980ec2437bd1ed7f9dc76955772bd23d2acb688"}], 0xa0, 0x8000}, 0x20000040) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000200)={r1, r2}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f0000003780)="2d26f263b0eb68a858b49254645003d305") sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)='d', 0x1}], 0x1, &(0x7f0000000400)=ANY=[]}, 0x0) recvmsg$kcm(r3, &(0x7f00000017c0)={&(0x7f0000000640)=@pppol2tpv3in6, 0x80, &(0x7f0000000780)=[{&(0x7f00000006c0)=""/106, 0x6a}, {&(0x7f0000000740)=""/16, 0x10}], 0x2, &(0x7f00000007c0)=""/4096, 0x1000, 0xfff}, 0x10002) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xe9, 0xeb, &(0x7f00000002c0)="d1b982c87c5fd04e1741935cd4c76b1b993a295ad9cc1467e6b2336a192bd3c21d09d5854b1ecd9833293b433a9d8ced7eb6981007e73634aea93fbd80343deae360dfc52bcb3ea77759843c7b8d7cf8562de5cd5532e333d9142d15b04e75e9428aeceee23bdbde8c1dfab04a95c25b1ec017b964d1957d7dbe3c88fe0d3706bd17b84d05909ef5d0eb1df141a3b87adf8ce268b3d067de49eded15ebe1a1728236250c6e50b538478899467a61fd86ef24fff289773b38bfa4ec7b43c3946e970788ffdbcb5e7da107650774547661d4f88d7aefca5335191fc2e5d7566e5bb86f42364f18c68d7a", &(0x7f00000003c0)=""/235, 0x7ff, 0xff}, 0x28) close(r4) [ 454.624621] rpc_populate.constprop.16+0x11f/0x390 [ 454.629569] rpc_fill_super+0x3c9/0xbb0 [ 454.633557] ? cap_capable+0x1f9/0x260 [ 454.637454] ? rpc_pipe_release+0xb70/0xb70 [ 454.641788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.647334] ? security_capable+0xa4/0xd0 [ 454.651496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.657039] ? ns_capable_common+0x13f/0x170 [ 454.661464] mount_ns+0x12a/0x1d0 [ 454.664922] ? rpc_pipe_release+0xb70/0xb70 [ 454.669252] rpc_mount+0x9e/0xd0 [ 454.672624] mount_fs+0xae/0x328 [ 454.676006] vfs_kern_mount.part.34+0xd4/0x4d0 [ 454.680598] ? may_umount+0xb0/0xb0 [ 454.684234] ? _raw_read_unlock+0x22/0x30 [ 454.688386] ? __get_fs_type+0x97/0xc0 [ 454.692273] do_mount+0x564/0x3070 [ 454.695815] ? copy_mount_string+0x40/0x40 [ 454.700050] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 454.704814] ? retint_kernel+0x10/0x10 [ 454.708705] ? copy_mount_options+0x1f0/0x380 [ 454.713194] ? __sanitizer_cov_trace_pc+0x3f/0x50 [ 454.718033] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.723570] ? copy_mount_options+0x285/0x380 [ 454.728066] ksys_mount+0x12d/0x140 [ 454.731689] SyS_mount+0x35/0x50 [ 454.735047] ? ksys_mount+0x140/0x140 [ 454.738840] do_syscall_64+0x29e/0x9d0 [ 454.742717] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 454.747550] ? syscall_return_slowpath+0x5c0/0x5c0 [ 454.752471] ? syscall_return_slowpath+0x30f/0x5c0 [ 454.757394] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 454.762753] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 454.767592] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 454.772773] RIP: 0033:0x4552d9 [ 454.775951] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 454.783652] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 454.790908] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 454.798164] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 454.805428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 454.812683] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000002a 2018/04/05 10:23:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 454.820326] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry portmap 2018/04/05 10:23:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x2c) 2018/04/05 10:23:18 executing program 2: socketpair(0x15, 0x5, 0x800001b7, &(0x7f00000001c0)) [ 454.904342] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:19 executing program 6 (fault-call:4 fault-nth:43): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:19 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\t', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:19 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:19 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000c3000)={0xe, 0x4, 0x4, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r0, &(0x7f0000000000), &(0x7f00000002c0)=""/101}, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r1, 0x0, 0x8}, 0xc) 2018/04/05 10:23:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:19 executing program 2: socketpair(0x15, 0x5, 0x80004a01, &(0x7f00000001c0)) 2018/04/05 10:23:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x2c) 2018/04/05 10:23:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) [ 455.623734] FAULT_INJECTION: forcing a failure. [ 455.623734] name failslab, interval 1, probability 0, space 0, times 0 [ 455.635204] CPU: 0 PID: 32118 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 455.642052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.651411] Call Trace: [ 455.654021] dump_stack+0x1b9/0x29f [ 455.657666] ? arch_local_irq_restore+0x52/0x52 [ 455.662358] should_fail.cold.4+0xa/0x1a [ 455.666439] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/05 10:23:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00]}, 0x2c) [ 455.671559] ? graph_lock+0x170/0x170 [ 455.675376] ? debug_check_no_locks_freed+0x310/0x310 [ 455.680583] ? find_held_lock+0x36/0x1c0 [ 455.684658] ? __lock_is_held+0xb5/0x140 [ 455.688741] ? check_same_owner+0x320/0x320 [ 455.693077] ? rcu_note_context_switch+0x710/0x710 [ 455.698013] ? lock_downgrade+0x8e0/0x8e0 [ 455.702172] should_failslab+0x124/0x180 [ 455.706238] kmem_cache_alloc+0x2af/0x760 [ 455.710402] __d_alloc+0xc1/0xc00 [ 455.713873] ? shrink_dcache_for_umount+0x290/0x290 [ 455.718901] ? d_alloc_parallel+0x1e80/0x1e80 2018/04/05 10:23:19 executing program 2: socketpair(0x15, 0x5, 0x80003700, &(0x7f00000001c0)) 2018/04/05 10:23:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 455.723412] ? lock_release+0xa10/0xa10 [ 455.727406] ? mark_held_locks+0xc9/0x160 [ 455.731567] ? d_lookup+0x254/0x330 [ 455.735207] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 455.740321] ? d_lookup+0x219/0x330 [ 455.743964] d_alloc+0x8e/0x370 [ 455.747268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.752824] ? __d_alloc+0xc00/0xc00 [ 455.756553] ? full_name_hash+0xc0/0x100 [ 455.760640] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 455.765934] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 455.770200] rpc_populate.constprop.16+0x99/0x390 [ 455.775064] rpc_fill_super+0x3c9/0xbb0 [ 455.779060] ? cap_capable+0x1f9/0x260 [ 455.782958] ? rpc_pipe_release+0xb70/0xb70 [ 455.787299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.792848] ? security_capable+0xa4/0xd0 [ 455.797011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.802557] ? ns_capable_common+0x13f/0x170 [ 455.806990] mount_ns+0x12a/0x1d0 [ 455.810453] ? rpc_pipe_release+0xb70/0xb70 [ 455.814785] rpc_mount+0x9e/0xd0 [ 455.818162] mount_fs+0xae/0x328 2018/04/05 10:23:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18]}, 0x2c) 2018/04/05 10:23:19 executing program 2: socketpair(0x15, 0x5, 0x80001d01, &(0x7f00000001c0)) 2018/04/05 10:23:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 455.821543] vfs_kern_mount.part.34+0xd4/0x4d0 [ 455.826130] ? may_umount+0xb0/0xb0 [ 455.829762] ? _raw_read_unlock+0x22/0x30 [ 455.833917] ? __get_fs_type+0x97/0xc0 [ 455.837815] do_mount+0x564/0x3070 [ 455.841366] ? copy_mount_string+0x40/0x40 [ 455.845610] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 455.850383] ? retint_kernel+0x10/0x10 [ 455.854282] ? copy_mount_options+0x1a1/0x380 [ 455.858781] ? __sanitizer_cov_trace_pc+0x38/0x50 [ 455.863633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.869183] ? copy_mount_options+0x285/0x380 [ 455.873691] ksys_mount+0x12d/0x140 [ 455.877332] SyS_mount+0x35/0x50 [ 455.880705] ? ksys_mount+0x140/0x140 [ 455.884512] do_syscall_64+0x29e/0x9d0 [ 455.888406] ? vmalloc_sync_all+0x30/0x30 [ 455.892565] ? _raw_spin_unlock_irq+0x27/0x70 [ 455.897066] ? finish_task_switch+0x1ca/0x820 [ 455.901569] ? syscall_return_slowpath+0x5c0/0x5c0 [ 455.906509] ? syscall_return_slowpath+0x30f/0x5c0 [ 455.911454] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 455.916831] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/05 10:23:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x2c) [ 455.921690] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 455.926880] RIP: 0033:0x4552d9 [ 455.930068] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 455.937784] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 455.945055] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 455.952349] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 455.959625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 455.966901] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000002b [ 455.977410] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:20 executing program 6 (fault-call:4 fault-nth:44): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:20 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653003", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:20 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:20 executing program 2: socketpair(0x15, 0x5, 0x8000019a, &(0x7f00000001c0)) 2018/04/05 10:23:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x4, 0x4660285e, 0x80, 0x5, 0xffffffffffffffff, 0x8}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0xc, 0x6, 0x100000000000000, 0x4, 0x4, r0}, 0xffffffffffffff7c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000140)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r1, 0x2bf79c20e9ed7586, &(0x7f0000000180)}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) 2018/04/05 10:23:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x2c) 2018/04/05 10:23:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:20 executing program 2: socketpair(0x15, 0x5, 0x800000fd, &(0x7f00000001c0)) 2018/04/05 10:23:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x2c) [ 456.710375] FAULT_INJECTION: forcing a failure. [ 456.710375] name failslab, interval 1, probability 0, space 0, times 0 [ 456.721721] CPU: 0 PID: 32162 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 456.728570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.737927] Call Trace: [ 456.740525] dump_stack+0x1b9/0x29f [ 456.744171] ? arch_local_irq_restore+0x52/0x52 [ 456.748857] should_fail.cold.4+0xa/0x1a [ 456.752942] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 456.758064] ? graph_lock+0x170/0x170 [ 456.761879] ? debug_check_no_locks_freed+0x310/0x310 [ 456.767090] ? find_held_lock+0x36/0x1c0 [ 456.771192] ? __lock_is_held+0xb5/0x140 [ 456.775289] ? check_same_owner+0x320/0x320 [ 456.779622] ? rcu_note_context_switch+0x710/0x710 [ 456.784560] ? lock_downgrade+0x8e0/0x8e0 [ 456.788724] should_failslab+0x124/0x180 [ 456.792797] kmem_cache_alloc+0x2af/0x760 [ 456.796968] __d_alloc+0xc1/0xc00 [ 456.800435] ? shrink_dcache_for_umount+0x290/0x290 [ 456.805467] ? d_alloc_parallel+0x1e80/0x1e80 [ 456.810003] ? lock_release+0xa10/0xa10 [ 456.814002] ? mark_held_locks+0xc9/0x160 [ 456.818190] ? d_lookup+0x254/0x330 [ 456.821832] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 456.826859] ? d_lookup+0x219/0x330 [ 456.830516] d_alloc+0x8e/0x370 [ 456.833805] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.839348] ? __d_alloc+0xc00/0xc00 [ 456.843067] ? full_name_hash+0xc0/0x100 [ 456.847165] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 456.852461] ? rpc_d_lookup_sb+0x1a0/0x1a0 2018/04/05 10:23:20 executing program 2: socketpair(0x15, 0x5, 0x80001100, &(0x7f00000001c0)) 2018/04/05 10:23:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x2c) [ 456.856716] rpc_populate.constprop.16+0x99/0x390 [ 456.861573] rpc_fill_super+0x3c9/0xbb0 [ 456.865552] ? cap_capable+0x1f9/0x260 [ 456.869447] ? rpc_pipe_release+0xb70/0xb70 [ 456.873785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.879332] ? security_capable+0xa4/0xd0 [ 456.884086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.889633] ? ns_capable_common+0x13f/0x170 [ 456.894058] mount_ns+0x12a/0x1d0 [ 456.897524] ? rpc_pipe_release+0xb70/0xb70 [ 456.901867] rpc_mount+0x9e/0xd0 [ 456.905253] mount_fs+0xae/0x328 [ 456.908634] vfs_kern_mount.part.34+0xd4/0x4d0 [ 456.913226] ? may_umount+0xb0/0xb0 [ 456.917040] ? _raw_read_unlock+0x22/0x30 [ 456.921199] ? __get_fs_type+0x97/0xc0 [ 456.925104] do_mount+0x564/0x3070 [ 456.928664] ? copy_mount_string+0x40/0x40 [ 456.932914] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 456.937952] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 456.942730] ? retint_kernel+0x10/0x10 [ 456.946636] ? copy_mount_options+0x1f0/0x380 [ 456.951141] ? copy_mount_options+0x1f6/0x380 [ 456.955646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 2018/04/05 10:23:20 executing program 2: socketpair(0x15, 0x5, 0x80000082, &(0x7f00000001c0)) 2018/04/05 10:23:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0x2c) [ 456.961193] ? copy_mount_options+0x285/0x380 [ 456.965703] ksys_mount+0x12d/0x140 [ 456.969343] SyS_mount+0x35/0x50 [ 456.972721] ? ksys_mount+0x140/0x140 [ 456.976537] do_syscall_64+0x29e/0x9d0 [ 456.980428] ? vmalloc_sync_all+0x30/0x30 [ 456.984585] ? _raw_spin_unlock_irq+0x27/0x70 [ 456.989089] ? finish_task_switch+0x1ca/0x820 [ 456.993593] ? syscall_return_slowpath+0x5c0/0x5c0 [ 456.998532] ? syscall_return_slowpath+0x30f/0x5c0 [ 457.003477] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 457.008855] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 457.013716] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 457.018909] RIP: 0033:0x4552d9 [ 457.022099] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 457.029816] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 457.037111] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 457.044392] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 457.051667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 457.058937] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000002c [ 457.073668] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:21 executing program 6 (fault-call:4 fault-nth:45): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:21 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:21 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:21 executing program 2: socketpair(0x15, 0x5, 0x8000006b, &(0x7f00000001c0)) 2018/04/05 10:23:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2c) 2018/04/05 10:23:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x5, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x3c}, [], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x99, &(0x7f0000000140)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f00000000c0)}, 0x28) socketpair(0x3, 0xe, 0x2, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r1, &(0x7f0000000240)="6064e417f4c94ba2a15cbd07a4f132f71630f0a90a058e2b5dc912d703c94fe5b25fdb187060f6dbbe81b8083236dc6de12bf0b8c2368d80e999ab366d1431b4bd9c7739d4c3e95df19d98150adfb84bc1df40b45e85812c9a86d099b79ae3b1275b45e22ddae932afac0ccd59fecae369fbe4e71092b400eb971bb5ac36dc8e0148648a0d3cb134ac1b91ccfc1321d7acfe74c54d7d7f9a520e989a5e83db3aee19d37c49f4a380cd5530bc1245ee55a04ba45fcc5d2eb9fd49ed95c5e9"}, 0x10) 2018/04/05 10:23:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 457.798968] FAULT_INJECTION: forcing a failure. [ 457.798968] name failslab, interval 1, probability 0, space 0, times 0 [ 457.810379] CPU: 1 PID: 32227 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 457.817229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.826591] Call Trace: [ 457.829195] dump_stack+0x1b9/0x29f [ 457.832845] ? arch_local_irq_restore+0x52/0x52 [ 457.837532] should_fail.cold.4+0xa/0x1a [ 457.841607] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 457.846725] ? graph_lock+0x170/0x170 [ 457.850542] ? debug_check_no_locks_freed+0x310/0x310 [ 457.855743] ? find_held_lock+0x36/0x1c0 [ 457.859820] ? __lock_is_held+0xb5/0x140 [ 457.863904] ? check_same_owner+0x320/0x320 [ 457.868234] ? rcu_note_context_switch+0x710/0x710 [ 457.873166] ? lock_downgrade+0x8e0/0x8e0 [ 457.877333] should_failslab+0x124/0x180 [ 457.881408] kmem_cache_alloc+0x2af/0x760 [ 457.885573] __d_alloc+0xc1/0xc00 [ 457.889039] ? shrink_dcache_for_umount+0x290/0x290 [ 457.894070] ? d_alloc_parallel+0x1e80/0x1e80 [ 457.898574] ? lock_release+0xa10/0xa10 [ 457.902540] ? mark_held_locks+0xc9/0x160 [ 457.906678] ? d_lookup+0x254/0x330 [ 457.910347] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 457.915349] ? d_lookup+0x219/0x330 [ 457.918964] d_alloc+0x8e/0x370 [ 457.922232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.927755] ? __d_alloc+0xc00/0xc00 [ 457.931464] ? full_name_hash+0xc0/0x100 [ 457.935517] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 457.940791] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 457.945026] rpc_populate.constprop.16+0x99/0x390 [ 457.949862] rpc_fill_super+0x3c9/0xbb0 [ 457.953830] ? cap_capable+0x1f9/0x260 [ 457.957709] ? rpc_pipe_release+0xb70/0xb70 [ 457.962028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.967553] ? security_capable+0xa4/0xd0 [ 457.971689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.977212] ? ns_capable_common+0x13f/0x170 [ 457.981610] mount_ns+0x12a/0x1d0 [ 457.985052] ? rpc_pipe_release+0xb70/0xb70 [ 457.989447] rpc_mount+0x9e/0xd0 [ 457.992804] mount_fs+0xae/0x328 [ 457.996163] vfs_kern_mount.part.34+0xd4/0x4d0 [ 458.000732] ? may_umount+0xb0/0xb0 [ 458.004344] ? _raw_read_unlock+0x22/0x30 [ 458.008479] ? __get_fs_type+0x97/0xc0 [ 458.012368] do_mount+0x564/0x3070 [ 458.015894] ? do_raw_spin_unlock+0x9e/0x2e0 [ 458.020294] ? copy_mount_string+0x40/0x40 [ 458.024516] ? rcu_pm_notify+0xc0/0xc0 [ 458.028396] ? copy_mount_options+0x5f/0x380 [ 458.032789] ? rcu_read_lock_sched_held+0x108/0x120 [ 458.037794] ? kmem_cache_alloc_trace+0x616/0x780 [ 458.042622] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 458.048145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 458.053669] ? copy_mount_options+0x285/0x380 [ 458.058150] ksys_mount+0x12d/0x140 [ 458.061763] SyS_mount+0x35/0x50 [ 458.065115] ? ksys_mount+0x140/0x140 [ 458.068905] do_syscall_64+0x29e/0x9d0 [ 458.072776] ? vmalloc_sync_all+0x30/0x30 [ 458.076910] ? kasan_check_write+0x14/0x20 [ 458.081131] ? syscall_return_slowpath+0x5c0/0x5c0 [ 458.086045] ? syscall_return_slowpath+0x30f/0x5c0 [ 458.090966] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 458.096492] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 458.101325] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 458.106507] RIP: 0033:0x4552d9 [ 458.109676] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 458.117370] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 458.124622] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 458.131873] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 458.139135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/04/05 10:23:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:21 executing program 2: socketpair(0x15, 0x5, 0x80008300, &(0x7f00000001c0)) 2018/04/05 10:23:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x2c) 2018/04/05 10:23:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 458.146389] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000002d [ 458.197531] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:22 executing program 6 (fault-call:4 fault-nth:46): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:22 executing program 2: socketpair(0x15, 0x5, 0x80001600, &(0x7f00000001c0)) 2018/04/05 10:23:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x2c) 2018/04/05 10:23:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x8000000000, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004747410c0faa820b8000007aa7c40a00afc74f8c738c"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x110000, 0xce, &(0x7f00000003c0)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) 2018/04/05 10:23:22 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c65309b", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:22 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, 0x2c) 2018/04/05 10:23:22 executing program 2: socketpair(0x15, 0x5, 0x800001e8, &(0x7f00000001c0)) [ 458.920138] FAULT_INJECTION: forcing a failure. [ 458.920138] name failslab, interval 1, probability 0, space 0, times 0 [ 458.931471] CPU: 1 PID: 32267 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 458.938317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.947683] Call Trace: [ 458.950292] dump_stack+0x1b9/0x29f [ 458.953939] ? arch_local_irq_restore+0x52/0x52 [ 458.958614] ? graph_lock+0x170/0x170 [ 458.962437] should_fail.cold.4+0xa/0x1a [ 458.966513] ? perf_trace_lock_acquire+0xe3/0x980 [ 458.971369] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 458.976488] ? perf_trace_lock+0x900/0x900 [ 458.980741] ? graph_lock+0x170/0x170 [ 458.984552] ? graph_lock+0x170/0x170 [ 458.988372] ? find_held_lock+0x36/0x1c0 [ 458.992443] ? __lock_is_held+0xb5/0x140 [ 458.996524] ? check_same_owner+0x320/0x320 [ 459.000855] ? rcu_note_context_switch+0x710/0x710 [ 459.005797] should_failslab+0x124/0x180 [ 459.009868] kmem_cache_alloc+0x2af/0x760 [ 459.014030] ? rpc_i_callback+0x30/0x30 [ 459.018012] rpc_alloc_inode+0x1a/0x20 [ 459.021909] alloc_inode+0x63/0x190 [ 459.025551] new_inode_pseudo+0x69/0x1a0 [ 459.029665] ? prune_icache_sb+0x1a0/0x1a0 [ 459.033907] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 459.038500] ? d_instantiate_no_diralias+0x240/0x240 [ 459.043615] ? kasan_check_write+0x14/0x20 [ 459.047861] ? do_raw_spin_lock+0xc1/0x200 [ 459.052110] new_inode+0x1c/0x40 [ 459.055481] rpc_get_inode+0x1e/0x1f0 [ 459.059289] ? d_drop+0x51/0x60 [ 459.062576] __rpc_create_common+0x5d/0x190 [ 459.066911] rpc_populate.constprop.16+0x11f/0x390 [ 459.071855] rpc_fill_super+0x3c9/0xbb0 [ 459.075842] ? cap_capable+0x1f9/0x260 [ 459.079740] ? rpc_pipe_release+0xb70/0xb70 [ 459.084073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.089619] ? security_capable+0xa4/0xd0 [ 459.093780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.099324] ? ns_capable_common+0x13f/0x170 [ 459.103741] mount_ns+0x12a/0x1d0 [ 459.107203] ? rpc_pipe_release+0xb70/0xb70 [ 459.111537] rpc_mount+0x9e/0xd0 [ 459.114914] mount_fs+0xae/0x328 [ 459.118294] vfs_kern_mount.part.34+0xd4/0x4d0 [ 459.122886] ? may_umount+0xb0/0xb0 [ 459.126526] ? _raw_read_unlock+0x22/0x30 [ 459.130684] ? __get_fs_type+0x97/0xc0 [ 459.134583] do_mount+0x564/0x3070 [ 459.138145] ? copy_mount_string+0x40/0x40 [ 459.142393] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 459.147165] ? retint_kernel+0x10/0x10 [ 459.151072] ? copy_mount_options+0x1e3/0x380 [ 459.155569] ? write_comp_data+0x70/0x70 [ 459.159622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.165144] ? copy_mount_options+0x285/0x380 [ 459.169631] ksys_mount+0x12d/0x140 [ 459.173255] SyS_mount+0x35/0x50 [ 459.176609] ? ksys_mount+0x140/0x140 [ 459.180413] do_syscall_64+0x29e/0x9d0 [ 459.184288] ? vmalloc_sync_all+0x30/0x30 [ 459.188430] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 459.193259] ? syscall_return_slowpath+0x5c0/0x5c0 [ 459.198180] ? syscall_return_slowpath+0x30f/0x5c0 [ 459.203113] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 459.208483] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 459.213318] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 459.218491] RIP: 0033:0x4552d9 [ 459.221674] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 459.229380] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 459.236644] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 459.243896] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 459.251160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 459.258420] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000002e [ 459.265879] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry statd [ 459.275074] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:23 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair(0x13, 0x5, 0x5, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28, &(0x7f0000000200)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000280)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000180)) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x3b6, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xe, 0x3f, 0xba, 0x98, 0x10, 0xffffffffffffffff, 0x9}, 0x2c) r3 = gettid() perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x6b2, 0x9, 0x80, 0x6, 0x0, 0x10000, 0x4000, 0xa, 0x6, 0x2, 0x7, 0x80000000, 0x8000, 0x4, 0x9, 0x5, 0x10001, 0xfff, 0x1, 0x4, 0x2, 0x3f, 0x2, 0x6, 0x4, 0x6, 0x1, 0x9, 0x1, 0x5, 0xffffffff, 0x9, 0x8, 0x5, 0xbea2, 0x9, 0x0, 0x6, 0x4, @perf_config_ext={0x1, 0x8}, 0x30000, 0x1, 0x1f, 0x1, 0xe7a7, 0xffffffffffff1806, 0xe9}, r3, 0x1, r2, 0x3) 2018/04/05 10:23:23 executing program 2: socketpair(0x15, 0x5, 0x8000004f, &(0x7f00000001c0)) 2018/04/05 10:23:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}, 0x2c) 2018/04/05 10:23:23 executing program 6 (fault-call:4 fault-nth:47): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:23 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653092", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:23 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 459.943963] FAULT_INJECTION: forcing a failure. [ 459.943963] name failslab, interval 1, probability 0, space 0, times 0 [ 459.955452] CPU: 1 PID: 32297 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 459.962299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.971654] Call Trace: [ 459.974256] dump_stack+0x1b9/0x29f [ 459.977910] ? arch_local_irq_restore+0x52/0x52 [ 459.982606] should_fail.cold.4+0xa/0x1a [ 459.986682] ? perf_trace_lock+0xd6/0x900 2018/04/05 10:23:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x2c) 2018/04/05 10:23:23 executing program 2: socketpair(0x15, 0x5, 0x80000052, &(0x7f00000001c0)) 2018/04/05 10:23:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 459.990848] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 459.995968] ? zap_class+0x720/0x720 [ 459.999696] ? graph_lock+0x170/0x170 [ 460.003508] ? debug_check_no_locks_freed+0x310/0x310 [ 460.008734] ? find_held_lock+0x36/0x1c0 [ 460.012815] ? __lock_is_held+0xb5/0x140 [ 460.016909] ? check_same_owner+0x320/0x320 [ 460.021247] ? rcu_note_context_switch+0x710/0x710 [ 460.026188] ? lock_downgrade+0x8e0/0x8e0 [ 460.030354] should_failslab+0x124/0x180 [ 460.034433] kmem_cache_alloc+0x2af/0x760 [ 460.038607] __d_alloc+0xc1/0xc00 [ 460.042077] ? shrink_dcache_for_umount+0x290/0x290 [ 460.047124] ? d_alloc_parallel+0x1e80/0x1e80 [ 460.051638] ? lock_release+0xa10/0xa10 [ 460.055630] ? mark_held_locks+0xc9/0x160 [ 460.059796] ? d_lookup+0x254/0x330 [ 460.063443] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 460.068473] ? d_lookup+0x219/0x330 [ 460.072118] d_alloc+0x8e/0x370 [ 460.075409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 460.080957] ? __d_alloc+0xc00/0xc00 [ 460.084683] ? full_name_hash+0xc0/0x100 [ 460.088769] __rpc_lookup_create_exclusive+0x18b/0x1e0 2018/04/05 10:23:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000]}, 0x2c) [ 460.094059] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 460.098319] rpc_populate.constprop.16+0x99/0x390 [ 460.103185] rpc_fill_super+0x3c9/0xbb0 [ 460.107174] ? cap_capable+0x1f9/0x260 [ 460.111075] ? rpc_pipe_release+0xb70/0xb70 [ 460.115416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 460.120966] ? security_capable+0xa4/0xd0 [ 460.125129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 460.130679] ? ns_capable_common+0x13f/0x170 [ 460.135107] mount_ns+0x12a/0x1d0 [ 460.138570] ? rpc_pipe_release+0xb70/0xb70 2018/04/05 10:23:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 460.142903] rpc_mount+0x9e/0xd0 [ 460.146280] mount_fs+0xae/0x328 [ 460.149660] vfs_kern_mount.part.34+0xd4/0x4d0 [ 460.154250] ? may_umount+0xb0/0xb0 [ 460.157885] ? _raw_read_unlock+0x22/0x30 [ 460.162042] ? __get_fs_type+0x97/0xc0 [ 460.165945] do_mount+0x564/0x3070 [ 460.169490] ? do_raw_spin_unlock+0x9e/0x2e0 [ 460.173911] ? copy_mount_string+0x40/0x40 [ 460.178157] ? rcu_pm_notify+0xc0/0xc0 [ 460.182067] ? copy_mount_options+0x5f/0x380 [ 460.186490] ? rcu_read_lock_sched_held+0x108/0x120 2018/04/05 10:23:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, 0x2c) [ 460.191512] ? kmem_cache_alloc_trace+0x616/0x780 [ 460.196366] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 460.201930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 460.207498] ? copy_mount_options+0x285/0x380 [ 460.212008] ksys_mount+0x12d/0x140 [ 460.215649] SyS_mount+0x35/0x50 [ 460.219022] ? ksys_mount+0x140/0x140 [ 460.222833] do_syscall_64+0x29e/0x9d0 [ 460.226724] ? vmalloc_sync_all+0x30/0x30 [ 460.230883] ? _raw_spin_unlock_irq+0x27/0x70 [ 460.235386] ? finish_task_switch+0x1ca/0x820 [ 460.239890] ? syscall_return_slowpath+0x5c0/0x5c0 [ 460.244838] ? syscall_return_slowpath+0x30f/0x5c0 [ 460.249786] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 460.255166] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 460.260031] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 460.265224] RIP: 0033:0x4552d9 [ 460.268415] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 460.276133] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 460.283405] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 460.290682] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 460.297961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 460.305240] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000002f [ 460.352441] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:24 executing program 2: socketpair(0x15, 0x5, 0x80000051, &(0x7f00000001c0)) 2018/04/05 10:23:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x2c) 2018/04/05 10:23:24 executing program 6 (fault-call:4 fault-nth:48): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:24 executing program 0: r0 = perf_event_open(&(0x7f0000014f88)={0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='locpuset\x00') 2018/04/05 10:23:24 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:24 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 461.025655] FAULT_INJECTION: forcing a failure. [ 461.025655] name failslab, interval 1, probability 0, space 0, times 0 [ 461.037017] CPU: 0 PID: 32355 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 461.043861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 461.053218] Call Trace: [ 461.055822] dump_stack+0x1b9/0x29f [ 461.059465] ? arch_local_irq_restore+0x52/0x52 [ 461.064146] ? graph_lock+0x170/0x170 [ 461.067968] should_fail.cold.4+0xa/0x1a [ 461.072042] ? perf_trace_lock_acquire+0xe3/0x980 [ 461.076988] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 461.082110] ? perf_trace_lock+0x900/0x900 [ 461.086354] ? graph_lock+0x170/0x170 [ 461.090173] ? graph_lock+0x170/0x170 [ 461.093992] ? find_held_lock+0x36/0x1c0 [ 461.098069] ? __lock_is_held+0xb5/0x140 [ 461.102151] ? check_same_owner+0x320/0x320 [ 461.106483] ? rcu_note_context_switch+0x710/0x710 [ 461.111442] should_failslab+0x124/0x180 [ 461.115555] kmem_cache_alloc+0x2af/0x760 [ 461.119974] ? rpc_i_callback+0x30/0x30 [ 461.123959] rpc_alloc_inode+0x1a/0x20 [ 461.127861] alloc_inode+0x63/0x190 [ 461.131510] new_inode_pseudo+0x69/0x1a0 [ 461.135582] ? prune_icache_sb+0x1a0/0x1a0 [ 461.139826] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 461.144420] ? d_instantiate_no_diralias+0x240/0x240 [ 461.149538] ? kasan_check_write+0x14/0x20 [ 461.153780] ? do_raw_spin_lock+0xc1/0x200 [ 461.158027] new_inode+0x1c/0x40 [ 461.161405] rpc_get_inode+0x1e/0x1f0 [ 461.165211] ? d_drop+0x51/0x60 [ 461.168504] __rpc_create_common+0x5d/0x190 [ 461.172845] rpc_populate.constprop.16+0x11f/0x390 [ 461.177786] rpc_fill_super+0x3c9/0xbb0 [ 461.181774] ? cap_capable+0x1f9/0x260 [ 461.185669] ? rpc_pipe_release+0xb70/0xb70 [ 461.190002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.195552] ? security_capable+0xa4/0xd0 [ 461.199711] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.205280] ? ns_capable_common+0x13f/0x170 [ 461.209722] mount_ns+0x12a/0x1d0 [ 461.213185] ? rpc_pipe_release+0xb70/0xb70 [ 461.217527] rpc_mount+0x9e/0xd0 [ 461.220906] mount_fs+0xae/0x328 [ 461.224288] vfs_kern_mount.part.34+0xd4/0x4d0 [ 461.228876] ? may_umount+0xb0/0xb0 [ 461.232537] ? _raw_read_unlock+0x22/0x30 [ 461.236686] ? __get_fs_type+0x97/0xc0 [ 461.240585] do_mount+0x564/0x3070 [ 461.244133] ? copy_mount_string+0x40/0x40 [ 461.248383] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 461.253149] ? retint_kernel+0x10/0x10 [ 461.257055] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 461.262598] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 461.268139] ? copy_mount_options+0x285/0x380 [ 461.272643] ksys_mount+0x12d/0x140 2018/04/05 10:23:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x2c) 2018/04/05 10:23:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x2c) 2018/04/05 10:23:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x2c) [ 461.276279] SyS_mount+0x35/0x50 [ 461.279654] ? ksys_mount+0x140/0x140 [ 461.283467] do_syscall_64+0x29e/0x9d0 [ 461.287363] ? vmalloc_sync_all+0x30/0x30 [ 461.291522] ? kasan_check_write+0x14/0x20 [ 461.295768] ? syscall_return_slowpath+0x5c0/0x5c0 [ 461.300709] ? syscall_return_slowpath+0x30f/0x5c0 [ 461.305657] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 461.311036] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 461.315894] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 461.321086] RIP: 0033:0x4552d9 [ 461.324278] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 461.331999] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 461.339271] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 461.346545] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 461.353817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 461.361086] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000030 [ 461.368577] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfsd4_cb [ 461.379385] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:25 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:25 executing program 6 (fault-call:4 fault-nth:49): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, 0x2c) 2018/04/05 10:23:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:25 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653097", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000000000000000000000000009500000000000000b73ad1047ce4d829547b2b687104000000770d40e77c396ae63ee1cfd2031b3cc609b5db52"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000240)) 2018/04/05 10:23:25 executing program 2: socketpair(0x15, 0x5, 0x80004f00, &(0x7f00000001c0)) [ 462.067924] FAULT_INJECTION: forcing a failure. [ 462.067924] name failslab, interval 1, probability 0, space 0, times 0 [ 462.079222] CPU: 1 PID: 32386 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 462.086073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 462.095438] Call Trace: [ 462.098046] dump_stack+0x1b9/0x29f [ 462.101692] ? arch_local_irq_restore+0x52/0x52 [ 462.106383] should_fail.cold.4+0xa/0x1a [ 462.110490] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 462.115611] ? graph_lock+0x170/0x170 [ 462.119430] ? debug_check_no_locks_freed+0x310/0x310 [ 462.124635] ? find_held_lock+0x36/0x1c0 [ 462.128711] ? __lock_is_held+0xb5/0x140 [ 462.132798] ? check_same_owner+0x320/0x320 [ 462.137128] ? rcu_note_context_switch+0x710/0x710 [ 462.142066] ? lock_downgrade+0x8e0/0x8e0 [ 462.146228] should_failslab+0x124/0x180 [ 462.150565] kmem_cache_alloc+0x2af/0x760 [ 462.154826] __d_alloc+0xc1/0xc00 [ 462.158557] ? shrink_dcache_for_umount+0x290/0x290 [ 462.163584] ? d_alloc_parallel+0x1e80/0x1e80 [ 462.168092] ? lock_release+0xa10/0xa10 [ 462.172076] ? mark_held_locks+0xc9/0x160 [ 462.176237] ? d_lookup+0x254/0x330 [ 462.179890] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 462.184926] ? d_lookup+0x219/0x330 [ 462.188563] d_alloc+0x8e/0x370 [ 462.191851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 462.197399] ? __d_alloc+0xc00/0xc00 [ 462.201121] ? full_name_hash+0xc0/0x100 [ 462.205209] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 462.210587] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 462.214842] rpc_populate.constprop.16+0x99/0x390 [ 462.219712] rpc_fill_super+0x3c9/0xbb0 [ 462.223706] ? cap_capable+0x1f9/0x260 [ 462.227599] ? rpc_pipe_release+0xb70/0xb70 [ 462.231938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 462.237481] ? security_capable+0xa4/0xd0 [ 462.241639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 462.247183] ? ns_capable_common+0x13f/0x170 [ 462.251603] mount_ns+0x12a/0x1d0 [ 462.255061] ? rpc_pipe_release+0xb70/0xb70 [ 462.259391] rpc_mount+0x9e/0xd0 [ 462.262767] mount_fs+0xae/0x328 2018/04/05 10:23:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x2c) 2018/04/05 10:23:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000]}, 0x2c) 2018/04/05 10:23:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x100000000000000, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:25 executing program 0: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000e7"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@ax25, 0x80, &(0x7f0000000140)=[{&(0x7f0000000440)=""/208, 0xd0}, {&(0x7f0000000540)=""/216, 0xd8}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/4096, 0x1000}], 0x4, &(0x7f0000002640)=""/180, 0xb4, 0x8}, 0x40000020) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@raw, &(0x7f0000000200)='GPL\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x2a8) [ 462.266152] vfs_kern_mount.part.34+0xd4/0x4d0 [ 462.270747] ? may_umount+0xb0/0xb0 [ 462.274383] ? _raw_read_unlock+0x22/0x30 [ 462.278538] ? __get_fs_type+0x97/0xc0 [ 462.282441] do_mount+0x564/0x3070 [ 462.285996] ? copy_mount_string+0x40/0x40 [ 462.290242] ? rcu_pm_notify+0xc0/0xc0 [ 462.294142] ? copy_mount_options+0x5f/0x380 [ 462.298557] ? rcu_read_lock_sched_held+0x108/0x120 [ 462.303585] ? kmem_cache_alloc_trace+0x616/0x780 [ 462.308436] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 462.313975] ? _copy_from_user+0xdf/0x150 2018/04/05 10:23:25 executing program 2: socketpair(0x15, 0x5, 0x8000bc00, &(0x7f00000001c0)) [ 462.318131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 462.323674] ? copy_mount_options+0x285/0x380 [ 462.328185] ksys_mount+0x12d/0x140 [ 462.331820] SyS_mount+0x35/0x50 [ 462.335191] ? ksys_mount+0x140/0x140 [ 462.338999] do_syscall_64+0x29e/0x9d0 [ 462.342889] ? vmalloc_sync_all+0x30/0x30 [ 462.347052] ? _raw_spin_unlock_irq+0x27/0x70 [ 462.351550] ? finish_task_switch+0x1ca/0x820 [ 462.356058] ? syscall_return_slowpath+0x5c0/0x5c0 [ 462.360995] ? syscall_return_slowpath+0x30f/0x5c0 2018/04/05 10:23:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 462.365941] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 462.371322] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 462.376190] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 462.381383] RIP: 0033:0x4552d9 [ 462.384571] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 462.392286] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 462.399559] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 462.406839] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 462.414118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 462.421423] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000031 [ 462.530275] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:26 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001ac0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001a80)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x0, &(0x7f0000002280)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000140)={r0}) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000240)=@pppol2tpv3, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/67, 0x43}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x2, &(0x7f0000000380)=""/21, 0x15, 0xff}, 0x1) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000240)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f00000004c0)) 2018/04/05 10:23:26 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, 0x2c) 2018/04/05 10:23:26 executing program 2: socketpair(0x15, 0x5, 0x80009301, &(0x7f00000001c0)) 2018/04/05 10:23:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:26 executing program 6 (fault-call:4 fault-nth:50): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:26 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:26 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530fe", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x8cffffff00000000, 0xffffffffffffffff, 0x0) [ 463.306572] FAULT_INJECTION: forcing a failure. [ 463.306572] name failslab, interval 1, probability 0, space 0, times 0 [ 463.317908] CPU: 1 PID: 32440 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 463.323124] cgroup: cgroup2: unknown option "" [ 463.324848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 463.324861] Call Trace: [ 463.324891] dump_stack+0x1b9/0x29f [ 463.324914] ? arch_local_irq_restore+0x52/0x52 [ 463.324928] ? graph_lock+0x170/0x170 2018/04/05 10:23:26 executing program 2: socketpair(0x15, 0x5, 0x80002500, &(0x7f00000001c0)) 2018/04/05 10:23:26 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}, 0x2c) 2018/04/05 10:23:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x8cffffff, 0xffffffffffffffff, 0x0) [ 463.324952] should_fail.cold.4+0xa/0x1a [ 463.357672] ? perf_trace_lock_acquire+0xe3/0x980 [ 463.362539] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 463.367667] ? perf_trace_lock+0x900/0x900 [ 463.370049] cgroup: cgroup2: unknown option "" [ 463.371913] ? graph_lock+0x170/0x170 [ 463.371943] ? find_held_lock+0x36/0x1c0 [ 463.371970] ? __lock_is_held+0xb5/0x140 [ 463.388472] ? check_same_owner+0x320/0x320 [ 463.392820] ? rcu_note_context_switch+0x710/0x710 [ 463.397780] should_failslab+0x124/0x180 [ 463.401862] kmem_cache_alloc+0x2af/0x760 [ 463.406029] ? rpc_i_callback+0x30/0x30 [ 463.410023] rpc_alloc_inode+0x1a/0x20 [ 463.413926] alloc_inode+0x63/0x190 [ 463.417568] new_inode_pseudo+0x69/0x1a0 [ 463.421642] ? prune_icache_sb+0x1a0/0x1a0 [ 463.425887] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 463.430478] ? d_instantiate_no_diralias+0x240/0x240 [ 463.435592] ? kasan_check_write+0x14/0x20 [ 463.439838] ? do_raw_spin_lock+0xc1/0x200 [ 463.444088] new_inode+0x1c/0x40 [ 463.447464] rpc_get_inode+0x1e/0x1f0 [ 463.451271] ? d_drop+0x51/0x60 [ 463.454560] __rpc_create_common+0x5d/0x190 [ 463.458896] rpc_populate.constprop.16+0x11f/0x390 [ 463.463844] rpc_fill_super+0x3c9/0xbb0 [ 463.467834] ? cap_capable+0x1f9/0x260 [ 463.471728] ? rpc_pipe_release+0xb70/0xb70 [ 463.476050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 463.481582] ? security_capable+0xa4/0xd0 [ 463.485723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 463.491253] ? ns_capable_common+0x13f/0x170 [ 463.495661] mount_ns+0x12a/0x1d0 [ 463.499109] ? rpc_pipe_release+0xb70/0xb70 [ 463.503425] rpc_mount+0x9e/0xd0 [ 463.506787] mount_fs+0xae/0x328 [ 463.510159] vfs_kern_mount.part.34+0xd4/0x4d0 [ 463.514753] ? may_umount+0xb0/0xb0 [ 463.518379] ? _raw_read_unlock+0x22/0x30 [ 463.522531] ? __get_fs_type+0x97/0xc0 [ 463.526417] do_mount+0x564/0x3070 [ 463.529947] ? do_raw_spin_unlock+0x9e/0x2e0 [ 463.534350] ? copy_mount_string+0x40/0x40 [ 463.538575] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 463.543669] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 463.548420] ? retint_kernel+0x10/0x10 [ 463.552308] ? copy_mount_options+0x1a1/0x380 [ 463.556801] ? copy_mount_options+0x1cc/0x380 [ 463.561291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 463.567000] ? copy_mount_options+0x285/0x380 [ 463.571500] ksys_mount+0x12d/0x140 [ 463.575134] SyS_mount+0x35/0x50 [ 463.578491] ? ksys_mount+0x140/0x140 [ 463.582285] do_syscall_64+0x29e/0x9d0 [ 463.586161] ? vmalloc_sync_all+0x30/0x30 [ 463.590301] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 463.595185] ? syscall_return_slowpath+0x5c0/0x5c0 [ 463.600106] ? syscall_return_slowpath+0x30f/0x5c0 [ 463.605040] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 463.610421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 463.615263] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 463.620442] RIP: 0033:0x4552d9 [ 463.623619] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 463.631323] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 463.638584] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 463.645843] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/04/05 10:23:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0xf6ffffff, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x2c) [ 463.653105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 463.660367] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000032 [ 463.667865] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry cache [ 463.680600] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:27 executing program 2: socketpair(0x15, 0x5, 0x8000010e, &(0x7f00000001c0)) 2018/04/05 10:23:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:27 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x6, 0x4, 0x100000001, 0x0, r1}, 0x2c) close(r0) socketpair(0x4, 0x3, 0x4, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/129}, 0x18) 2018/04/05 10:23:27 executing program 6 (fault-call:4 fault-nth:51): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x4000000, 0xffffffffffffffff, 0x0) [ 463.976699] FAULT_INJECTION: forcing a failure. [ 463.976699] name failslab, interval 1, probability 0, space 0, times 0 [ 463.988690] CPU: 0 PID: 32492 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 463.995547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.004917] Call Trace: [ 464.007528] dump_stack+0x1b9/0x29f [ 464.011186] ? arch_local_irq_restore+0x52/0x52 [ 464.015877] ? graph_lock+0x170/0x170 [ 464.019706] should_fail.cold.4+0xa/0x1a [ 464.023775] ? perf_trace_lock_acquire+0xe3/0x980 [ 464.028612] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 464.033705] ? perf_trace_lock+0x900/0x900 [ 464.037926] ? graph_lock+0x170/0x170 [ 464.041714] ? graph_lock+0x170/0x170 [ 464.045503] ? find_held_lock+0x36/0x1c0 [ 464.049559] ? __lock_is_held+0xb5/0x140 [ 464.053613] ? check_same_owner+0x320/0x320 [ 464.057921] ? rcu_note_context_switch+0x710/0x710 [ 464.062840] should_failslab+0x124/0x180 [ 464.066887] kmem_cache_alloc+0x2af/0x760 [ 464.071031] ? rpc_i_callback+0x30/0x30 [ 464.074998] rpc_alloc_inode+0x1a/0x20 [ 464.078881] alloc_inode+0x63/0x190 [ 464.082498] new_inode_pseudo+0x69/0x1a0 [ 464.086550] ? prune_icache_sb+0x1a0/0x1a0 [ 464.090782] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 464.095375] ? d_instantiate_no_diralias+0x240/0x240 [ 464.100480] ? kasan_check_write+0x14/0x20 [ 464.104711] ? do_raw_spin_lock+0xc1/0x200 [ 464.108965] new_inode+0x1c/0x40 [ 464.112337] rpc_get_inode+0x1e/0x1f0 [ 464.116148] ? d_drop+0x51/0x60 [ 464.119435] __rpc_create_common+0x5d/0x190 [ 464.123758] rpc_populate.constprop.16+0x11f/0x390 [ 464.128680] rpc_fill_super+0x3c9/0xbb0 [ 464.132653] ? cap_capable+0x1f9/0x260 [ 464.136534] ? rpc_pipe_release+0xb70/0xb70 [ 464.140840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.146363] ? security_capable+0xa4/0xd0 [ 464.150497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.156039] ? ns_capable_common+0x13f/0x170 [ 464.160459] mount_ns+0x12a/0x1d0 [ 464.163905] ? rpc_pipe_release+0xb70/0xb70 [ 464.168215] rpc_mount+0x9e/0xd0 [ 464.171583] mount_fs+0xae/0x328 [ 464.174942] vfs_kern_mount.part.34+0xd4/0x4d0 [ 464.179514] ? may_umount+0xb0/0xb0 [ 464.183124] ? _raw_read_unlock+0x22/0x30 [ 464.187277] ? __get_fs_type+0x97/0xc0 [ 464.191175] do_mount+0x564/0x3070 [ 464.194723] ? copy_mount_string+0x40/0x40 [ 464.198961] ? rcu_pm_notify+0xc0/0xc0 [ 464.202847] ? copy_mount_options+0x5f/0x380 [ 464.207246] ? rcu_read_lock_sched_held+0x108/0x120 [ 464.212261] ? kmem_cache_alloc_trace+0x616/0x780 [ 464.217093] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 464.222613] ? _copy_from_user+0xdf/0x150 [ 464.226745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.232272] ? copy_mount_options+0x285/0x380 [ 464.236771] ksys_mount+0x12d/0x140 [ 464.240394] SyS_mount+0x35/0x50 [ 464.243742] ? ksys_mount+0x140/0x140 [ 464.247530] do_syscall_64+0x29e/0x9d0 [ 464.251398] ? vmalloc_sync_all+0x30/0x30 [ 464.255540] ? _raw_spin_unlock_irq+0x27/0x70 [ 464.260025] ? finish_task_switch+0x1ca/0x820 [ 464.264510] ? syscall_return_slowpath+0x5c0/0x5c0 [ 464.269420] ? syscall_return_slowpath+0x30f/0x5c0 [ 464.274334] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 464.279684] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 464.284513] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 464.289687] RIP: 0033:0x4552d9 [ 464.292867] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 464.300571] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 464.308267] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 464.315522] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/04/05 10:23:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x2c) 2018/04/05 10:23:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:27 executing program 2: socketpair(0x15, 0x5, 0x8000019e, &(0x7f00000001c0)) 2018/04/05 10:23:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x2000000, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x12f}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000711000000000000800000000000000009500000000000000b1399c6795be8cf64da2ec3efcdadd27d76d5e5c6bba1f6e"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xffffffffffffff11, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000200)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66fef275d86930050725bc51c5605f7c08efe32414eb44d094fbe30f53c69e66107410800000000000000f0e2db36d5dde3bc8dff010000e9c5e917f6aff6ee6fd4b20169723781c7fd9accecc59cd80cb5e6c0a639a9be708555a68f36afc464bbb5becae642628c2eeb2de7d2e363b27d0c129e3b1ee24a90936cdb705ce40158ea4f675959"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) 2018/04/05 10:23:27 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653002", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:27 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:27 executing program 6 (fault-call:4 fault-nth:52): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) [ 464.322777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 464.330036] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000033 [ 464.337397] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry gssd [ 464.350181] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 464.472607] FAULT_INJECTION: forcing a failure. [ 464.472607] name failslab, interval 1, probability 0, space 0, times 0 [ 464.484068] CPU: 0 PID: 32521 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 464.490923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.500285] Call Trace: [ 464.502891] dump_stack+0x1b9/0x29f [ 464.506537] ? arch_local_irq_restore+0x52/0x52 [ 464.511235] ? graph_lock+0x170/0x170 [ 464.515058] should_fail.cold.4+0xa/0x1a [ 464.519131] ? perf_trace_lock_acquire+0xe3/0x980 [ 464.523991] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 464.529110] ? perf_trace_lock+0x900/0x900 [ 464.533367] ? graph_lock+0x170/0x170 [ 464.537183] ? graph_lock+0x170/0x170 [ 464.541003] ? find_held_lock+0x36/0x1c0 [ 464.545168] ? __lock_is_held+0xb5/0x140 [ 464.549258] ? check_same_owner+0x320/0x320 [ 464.553594] ? rcu_note_context_switch+0x710/0x710 [ 464.558543] should_failslab+0x124/0x180 [ 464.562616] kmem_cache_alloc+0x2af/0x760 [ 464.567744] ? rpc_i_callback+0x30/0x30 2018/04/05 10:23:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x2c) 2018/04/05 10:23:27 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x1, 0x5, 0x1, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='afs\x00', 0x2005800, &(0x7f00000001c0)="700306fa8431f8ff10c2f3efb8a069b70da544b0905df03555fd398c522e70d4e39210a800b8cd214cbeb1aace") mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='selinuxfs\x00', 0x0, &(0x7f0000000400)="fd6e6c6fcf269921f1f5e48b844c79ad365150ca492e0ca8438f3d3b7c4fdb2f4440e9a5f556edd8e51b11f35e6138000cfcf62d30aca6f86d156caad1516552937927777901a56b742fd48edb46812936fd7316a3349369223246ef15597400b47dc283c58198fd47f80589c8a42856597784713982e843c02fdd44a653e3818fd3a09a6c239d597c59945d89e720ffe79ed7f4a3ffca373b5c142819c0d72271c3afea1acb10820ad3915ca3373daa93f23825d9") mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1080400, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) 2018/04/05 10:23:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0x2c) 2018/04/05 10:23:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:28 executing program 2: socketpair(0x15, 0x5, 0x8000b300, &(0x7f00000001c0)) 2018/04/05 10:23:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x1000000, 0xffffffffffffffff, 0x0) [ 464.571725] rpc_alloc_inode+0x1a/0x20 [ 464.575619] alloc_inode+0x63/0x190 [ 464.579255] new_inode_pseudo+0x69/0x1a0 [ 464.583326] ? prune_icache_sb+0x1a0/0x1a0 [ 464.587571] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 464.592166] ? d_instantiate_no_diralias+0x240/0x240 [ 464.597280] ? kasan_check_write+0x14/0x20 [ 464.601521] ? do_raw_spin_lock+0xc1/0x200 [ 464.605765] new_inode+0x1c/0x40 [ 464.609144] rpc_get_inode+0x1e/0x1f0 [ 464.612952] ? d_drop+0x51/0x60 [ 464.616242] __rpc_create_common+0x5d/0x190 2018/04/05 10:23:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x200000001c}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffff9c, 0x50, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7ffa, 0x0, 0x201a7fd7, 0xa, 0x0, 0xffffffc0}], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x6, 0x2ed, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0x50, &(0x7f00000003c0)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0xe, 0xb6, &(0x7f0000000040)="03e43ae3e0e0e4a1b4d6dcfbf56a", &(0x7f0000000100)=""/182}, 0x28) r2 = perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x4, 0xfffffffffffff801, 0x3, 0x200, 0x0, 0x6, 0x10, 0x9, 0x100000001, 0xea5f, 0x5, 0x100, 0x1, 0xd9c, 0x7f, 0x2, 0x2, 0x7, 0x1, 0x1, 0xffffffffffffffff, 0x9, 0x400, 0x0, 0x534e, 0x9, 0x7, 0xffffffffffff8000, 0x92e, 0x3, 0x3, 0x2, 0x0, 0x6, 0xffff, 0x5, 0x0, 0x3d, 0x5, @perf_config_ext={0x7, 0x6}, 0x4802, 0x3, 0x4, 0x0, 0x1, 0x2, 0x6}, 0x0, 0xb, r1, 0x1) r3 = perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x5, 0x7ff, 0x7, 0x10000, 0x0, 0xfff, 0x204, 0x7, 0x3663, 0x80, 0x1, 0x0, 0x7fff, 0x0, 0x7, 0x2, 0xebc8, 0x20, 0xfffffffffffff000, 0x5, 0x6, 0xbde2, 0xffffffff, 0x9, 0x7, 0xeb2, 0x7, 0x5, 0x3, 0xfffffffffffffff9, 0x8, 0x98, 0x1ff, 0xffffffffffff80b0, 0xfff, 0x5, 0x0, 0xfffffffffffffe00, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x8082, 0x2da, 0x9, 0x7, 0x9b, 0x80, 0x915b}, 0xffffffffffffffff, 0x1, 0xffffffffffffff9c, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) [ 464.620581] rpc_populate.constprop.16+0x11f/0x390 [ 464.625529] rpc_fill_super+0x3c9/0xbb0 [ 464.629513] ? cap_capable+0x1f9/0x260 [ 464.633414] ? rpc_pipe_release+0xb70/0xb70 [ 464.637749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.643301] ? security_capable+0xa4/0xd0 [ 464.647465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.653013] ? ns_capable_common+0x13f/0x170 [ 464.657434] mount_ns+0x12a/0x1d0 [ 464.660896] ? rpc_pipe_release+0xb70/0xb70 [ 464.665236] rpc_mount+0x9e/0xd0 [ 464.668619] mount_fs+0xae/0x328 [ 464.671999] vfs_kern_mount.part.34+0xd4/0x4d0 [ 464.676594] ? may_umount+0xb0/0xb0 [ 464.680240] ? _raw_read_unlock+0x22/0x30 [ 464.684399] ? __get_fs_type+0x97/0xc0 [ 464.688301] do_mount+0x564/0x3070 [ 464.691873] ? copy_mount_string+0x40/0x40 [ 464.696119] ? rcu_pm_notify+0xc0/0xc0 [ 464.700024] ? copy_mount_options+0x5f/0x380 [ 464.704445] ? rcu_read_lock_sched_held+0x108/0x120 [ 464.709476] ? kmem_cache_alloc_trace+0x616/0x780 [ 464.714332] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 464.719878] ? _copy_from_user+0xdf/0x150 2018/04/05 10:23:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:28 executing program 2: socketpair(0x15, 0x5, 0x80005600, &(0x7f00000001c0)) 2018/04/05 10:23:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x4, 0xffffffffffffffff, 0x0) [ 464.724037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.729582] ? copy_mount_options+0x285/0x380 [ 464.734094] ksys_mount+0x12d/0x140 [ 464.737730] SyS_mount+0x35/0x50 [ 464.741103] ? ksys_mount+0x140/0x140 [ 464.744914] do_syscall_64+0x29e/0x9d0 [ 464.748806] ? vmalloc_sync_all+0x30/0x30 [ 464.752964] ? _raw_spin_unlock_irq+0x27/0x70 [ 464.757553] ? finish_task_switch+0x1ca/0x820 [ 464.762058] ? syscall_return_slowpath+0x5c0/0x5c0 [ 464.766997] ? syscall_return_slowpath+0x30f/0x5c0 [ 464.771948] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 464.777325] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 464.782195] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 464.787391] RIP: 0033:0x4552d9 [ 464.790590] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 464.798317] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 464.805601] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 464.812879] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 464.820158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 464.827443] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000034 [ 464.834817] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry gssd [ 464.859538] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/05 10:23:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x2c) 2018/04/05 10:23:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:28 executing program 2: socketpair(0x15, 0x5, 0x80000126, &(0x7f00000001c0)) 2018/04/05 10:23:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0xffffff8c, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:28 executing program 6 (fault-call:4 fault-nth:53): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xb48, 0x3ff, 0xd9, 0x1ff, 0x0, 0x3, 0x4000, 0xf, 0x0, 0x1, 0x2, 0xffc, 0x9, 0x5, 0x3ff, 0x6, 0x2, 0x1, 0xff, 0x100000001, 0x7, 0x3, 0x1000000000000, 0x48, 0x5, 0xffff, 0x1, 0x34, 0x5, 0xfffffffffffffc00, 0x4, 0x72, 0x0, 0x1, 0x7, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x7, 0x6}, 0x10003, 0x8001, 0x8, 0x6, 0x4, 0x5, 0xfffffffffffffff7}, 0x0, 0xc, 0xffffffffffffff9c, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7fffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="ff0f000000000000000000009a219a440000900095000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0x0, 0xb6, &(0x7f0000000000), &(0x7f0000000100)=""/182}, 0x28) 2018/04/05 10:23:28 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0P', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:28 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 465.522337] FAULT_INJECTION: forcing a failure. [ 465.522337] name failslab, interval 1, probability 0, space 0, times 0 [ 465.533675] CPU: 0 PID: 32569 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 465.540523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.549884] Call Trace: [ 465.552483] dump_stack+0x1b9/0x29f [ 465.556121] ? arch_local_irq_restore+0x52/0x52 [ 465.560797] ? graph_lock+0x170/0x170 [ 465.564615] should_fail.cold.4+0xa/0x1a 2018/04/05 10:23:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0xfffffff6, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:29 executing program 2: socketpair(0x15, 0x5, 0x8000b701, &(0x7f00000001c0)) 2018/04/05 10:23:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x2c) 2018/04/05 10:23:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 465.568689] ? perf_trace_lock_acquire+0xe3/0x980 [ 465.573544] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 465.578664] ? perf_trace_lock+0x900/0x900 [ 465.582916] ? graph_lock+0x170/0x170 [ 465.586735] ? graph_lock+0x170/0x170 [ 465.590558] ? find_held_lock+0x36/0x1c0 [ 465.594635] ? __lock_is_held+0xb5/0x140 [ 465.598731] ? check_same_owner+0x320/0x320 [ 465.603072] ? rcu_note_context_switch+0x710/0x710 [ 465.608016] should_failslab+0x124/0x180 [ 465.612096] kmem_cache_alloc+0x2af/0x760 [ 465.616270] ? rpc_i_callback+0x30/0x30 [ 465.620259] rpc_alloc_inode+0x1a/0x20 [ 465.624156] alloc_inode+0x63/0x190 [ 465.627795] new_inode_pseudo+0x69/0x1a0 [ 465.631863] ? prune_icache_sb+0x1a0/0x1a0 [ 465.636112] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 465.640705] ? d_instantiate_no_diralias+0x240/0x240 [ 465.645823] ? kasan_check_write+0x14/0x20 [ 465.650071] ? do_raw_spin_lock+0xc1/0x200 [ 465.654321] new_inode+0x1c/0x40 [ 465.657698] rpc_get_inode+0x1e/0x1f0 [ 465.661506] ? d_drop+0x51/0x60 [ 465.664799] __rpc_create_common+0x5d/0x190 [ 465.669141] rpc_populate.constprop.16+0x11f/0x390 [ 465.674089] rpc_fill_super+0x4c1/0xbb0 [ 465.678082] ? cap_capable+0x1f9/0x260 [ 465.681985] ? rpc_pipe_release+0xb70/0xb70 [ 465.686317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.691861] ? security_capable+0xa4/0xd0 [ 465.696018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.701566] ? ns_capable_common+0x13f/0x170 [ 465.705994] mount_ns+0x12a/0x1d0 [ 465.709454] ? rpc_pipe_release+0xb70/0xb70 [ 465.713793] rpc_mount+0x9e/0xd0 [ 465.717175] mount_fs+0xae/0x328 [ 465.720559] vfs_kern_mount.part.34+0xd4/0x4d0 [ 465.725151] ? may_umount+0xb0/0xb0 [ 465.728791] ? _raw_read_unlock+0x22/0x30 [ 465.732946] ? __get_fs_type+0x97/0xc0 [ 465.736854] do_mount+0x564/0x3070 [ 465.740410] ? copy_mount_string+0x40/0x40 [ 465.744656] ? rcu_pm_notify+0xc0/0xc0 [ 465.748562] ? copy_mount_options+0x5f/0x380 [ 465.752975] ? rcu_read_lock_sched_held+0x108/0x120 [ 465.758001] ? kmem_cache_alloc_trace+0x616/0x780 [ 465.762856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 465.768406] ? _copy_from_user+0xdf/0x150 [ 465.772569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.778118] ? copy_mount_options+0x285/0x380 [ 465.782628] ksys_mount+0x12d/0x140 [ 465.786267] SyS_mount+0x35/0x50 [ 465.789646] ? ksys_mount+0x140/0x140 [ 465.793457] do_syscall_64+0x29e/0x9d0 [ 465.797354] ? vmalloc_sync_all+0x30/0x30 [ 465.801512] ? _raw_spin_unlock_irq+0x27/0x70 [ 465.806014] ? finish_task_switch+0x1ca/0x820 [ 465.810519] ? syscall_return_slowpath+0x5c0/0x5c0 [ 465.815453] ? syscall_return_slowpath+0x30f/0x5c0 [ 465.820570] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 465.826029] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 465.830866] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 465.836042] RIP: 0033:0x4552d9 [ 465.839224] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 465.846925] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 465.854183] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 465.861446] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 465.868710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 465.875974] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000035 [ 465.883467] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry clntXX [ 465.895920] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory gssd 2018/04/05 10:23:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x400000000000000, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0x2c) 2018/04/05 10:23:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000040)=ANY=[]}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) sendmsg(r0, &(0x7f00000013c0)={&(0x7f00000000c0)=@rc={0x1f}, 0x80, &(0x7f00000001c0), 0x0, &(0x7f00000001c0), 0xffffffffffffffdb}, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000040)) close(r0) close(r0) 2018/04/05 10:23:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:30 executing program 2: socketpair(0x15, 0x5, 0x80007201, &(0x7f00000001c0)) 2018/04/05 10:23:30 executing program 6 (fault-call:4 fault-nth:54): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:30 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:30 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0x2c) 2018/04/05 10:23:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 466.591745] FAULT_INJECTION: forcing a failure. [ 466.591745] name failslab, interval 1, probability 0, space 0, times 0 [ 466.603625] CPU: 0 PID: 32605 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 466.610474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.619830] Call Trace: [ 466.622521] dump_stack+0x1b9/0x29f [ 466.626166] ? arch_local_irq_restore+0x52/0x52 [ 466.630850] ? graph_lock+0x170/0x170 [ 466.634673] should_fail.cold.4+0xa/0x1a [ 466.638746] ? perf_trace_lock_acquire+0xe3/0x980 [ 466.643607] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 466.648725] ? perf_trace_lock+0x900/0x900 [ 466.652976] ? graph_lock+0x170/0x170 [ 466.656877] ? graph_lock+0x170/0x170 [ 466.660692] ? find_held_lock+0x36/0x1c0 [ 466.664769] ? __lock_is_held+0xb5/0x140 [ 466.668851] ? check_same_owner+0x320/0x320 [ 466.673182] ? rcu_note_context_switch+0x710/0x710 [ 466.678132] should_failslab+0x124/0x180 [ 466.682208] kmem_cache_alloc+0x2af/0x760 [ 466.686370] ? rpc_i_callback+0x30/0x30 2018/04/05 10:23:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0x2c) [ 466.690355] rpc_alloc_inode+0x1a/0x20 [ 466.694251] alloc_inode+0x63/0x190 [ 466.697896] new_inode_pseudo+0x69/0x1a0 [ 466.701969] ? prune_icache_sb+0x1a0/0x1a0 [ 466.706210] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 466.710800] ? d_instantiate_no_diralias+0x240/0x240 [ 466.715920] ? kasan_check_write+0x14/0x20 [ 466.720162] ? do_raw_spin_lock+0xc1/0x200 [ 466.724409] new_inode+0x1c/0x40 [ 466.727816] rpc_get_inode+0x1e/0x1f0 [ 466.731623] ? d_drop+0x51/0x60 [ 466.734917] __rpc_create_common+0x5d/0x190 [ 466.739255] rpc_populate.constprop.16+0x11f/0x390 [ 466.744208] rpc_fill_super+0x4c1/0xbb0 [ 466.748192] ? cap_capable+0x1f9/0x260 [ 466.752092] ? rpc_pipe_release+0xb70/0xb70 [ 466.756428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 466.761978] ? security_capable+0xa4/0xd0 [ 466.766140] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 466.771689] ? ns_capable_common+0x13f/0x170 [ 466.776106] mount_ns+0x12a/0x1d0 [ 466.779564] ? rpc_pipe_release+0xb70/0xb70 [ 466.783894] rpc_mount+0x9e/0xd0 [ 466.787272] mount_fs+0xae/0x328 2018/04/05 10:23:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x2c) [ 466.790651] vfs_kern_mount.part.34+0xd4/0x4d0 [ 466.795239] ? may_umount+0xb0/0xb0 [ 466.798872] ? _raw_read_unlock+0x22/0x30 [ 466.803027] ? __get_fs_type+0x97/0xc0 [ 466.806924] do_mount+0x564/0x3070 [ 466.810473] ? copy_mount_string+0x40/0x40 [ 466.814709] ? rcu_pm_notify+0xc0/0xc0 [ 466.818611] ? copy_mount_options+0x5f/0x380 [ 466.823036] ? rcu_read_lock_sched_held+0x108/0x120 [ 466.828061] ? kmem_cache_alloc_trace+0x616/0x780 [ 466.832916] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 466.838464] ? _copy_from_user+0xdf/0x150 [ 466.842624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 466.848173] ? copy_mount_options+0x285/0x380 [ 466.852679] ksys_mount+0x12d/0x140 [ 466.856335] SyS_mount+0x35/0x50 [ 466.859711] ? ksys_mount+0x140/0x140 [ 466.863517] do_syscall_64+0x29e/0x9d0 [ 466.867408] ? vmalloc_sync_all+0x30/0x30 [ 466.871565] ? _raw_spin_unlock_irq+0x27/0x70 [ 466.876065] ? finish_task_switch+0x1ca/0x820 [ 466.881048] ? syscall_return_slowpath+0x5c0/0x5c0 [ 466.885986] ? syscall_return_slowpath+0x30f/0x5c0 [ 466.890934] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 466.896305] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 466.901157] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 466.906347] RIP: 0033:0x4552d9 [ 466.909536] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 466.917246] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 466.924522] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 466.931793] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 466.939063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 466.946333] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000036 [ 466.953888] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry clntXX [ 466.978960] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory gssd 2018/04/05 10:23:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00]}, 0x2c) 2018/04/05 10:23:31 executing program 2: socketpair(0x15, 0x5, 0x800001f8, &(0x7f00000001c0)) 2018/04/05 10:23:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0xf6ffffff00000000, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:31 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x107}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3a8, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x15) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000340)="b82283802d13000000000700a804ccf7c66f00fb6627032c04680f1b516b2d3db02926045f8c93bc0f927b811c299ec605c21854771bf1384065f6add07d7054d14365095ac9b17252e444148c8d0460bd98bd11d734d9682ba4c938fd19b91762ed5b795cefde72e026a91a67e49026576ef51369e876f296410228ea96192ba6ac332baf0f5c875a22628ad32a750eee8e5750dd862fa20cb910e7a3635c279e"}, 0x101f2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) 2018/04/05 10:23:31 executing program 6 (fault-call:4 fault-nth:55): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:31 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:31 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653091", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 467.681233] FAULT_INJECTION: forcing a failure. [ 467.681233] name failslab, interval 1, probability 0, space 0, times 0 [ 467.692546] CPU: 1 PID: 32659 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 467.699395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.708758] Call Trace: [ 467.711382] dump_stack+0x1b9/0x29f [ 467.715619] ? arch_local_irq_restore+0x52/0x52 [ 467.720304] should_fail.cold.4+0xa/0x1a [ 467.724373] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 467.729494] ? graph_lock+0x170/0x170 [ 467.733308] ? find_held_lock+0x36/0x1c0 [ 467.737384] ? __lock_is_held+0xb5/0x140 [ 467.741472] ? check_same_owner+0x320/0x320 [ 467.745803] ? rcu_note_context_switch+0x710/0x710 [ 467.750742] ? lock_downgrade+0x8e0/0x8e0 [ 467.754906] should_failslab+0x124/0x180 [ 467.758977] kmem_cache_alloc+0x2af/0x760 [ 467.763143] __d_alloc+0xc1/0xc00 [ 467.766604] ? shrink_dcache_for_umount+0x290/0x290 [ 467.771632] ? d_alloc_parallel+0x1e80/0x1e80 [ 467.776140] ? lock_release+0xa10/0xa10 [ 467.780119] ? do_raw_spin_lock+0xc1/0x200 [ 467.784368] ? mark_held_locks+0xc9/0x160 [ 467.788528] ? d_lookup+0x254/0x330 [ 467.792172] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 467.797194] ? d_lookup+0x219/0x330 [ 467.800922] d_alloc+0x8e/0x370 [ 467.804207] ? __d_alloc+0xc00/0xc00 [ 467.807926] ? full_name_hash+0xc0/0x100 [ 467.812005] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 467.817293] ? down_write+0x87/0x120 [ 467.821013] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 467.825254] ? down_read+0x1b0/0x1b0 [ 467.828980] ? __d_lookup+0x9c0/0x9c0 [ 467.832794] rpc_populate.constprop.16+0x99/0x390 [ 467.837657] rpc_fill_super+0x6ae/0xbb0 [ 467.841646] ? rpc_pipe_release+0xb70/0xb70 [ 467.845983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 467.851527] ? security_capable+0xa4/0xd0 [ 467.855682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 467.861223] ? ns_capable_common+0x13f/0x170 [ 467.865641] mount_ns+0x12a/0x1d0 [ 467.869098] ? rpc_pipe_release+0xb70/0xb70 [ 467.873431] rpc_mount+0x9e/0xd0 [ 467.876804] mount_fs+0xae/0x328 [ 467.880269] vfs_kern_mount.part.34+0xd4/0x4d0 [ 467.884857] ? may_umount+0xb0/0xb0 [ 467.888491] ? _raw_read_unlock+0x22/0x30 [ 467.892645] ? __get_fs_type+0x97/0xc0 [ 467.896538] do_mount+0x564/0x3070 [ 467.900085] ? copy_mount_string+0x40/0x40 [ 467.904328] ? rcu_pm_notify+0xc0/0xc0 [ 467.908229] ? copy_mount_options+0x5f/0x380 [ 467.912645] ? rcu_read_lock_sched_held+0x108/0x120 [ 467.917665] ? kmem_cache_alloc_trace+0x616/0x780 [ 467.922517] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.928064] ? _copy_from_user+0xdf/0x150 [ 467.932221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 467.937768] ? copy_mount_options+0x285/0x380 [ 467.942281] ksys_mount+0x12d/0x140 [ 467.945917] SyS_mount+0x35/0x50 [ 467.949287] ? ksys_mount+0x140/0x140 [ 467.953096] do_syscall_64+0x29e/0x9d0 [ 467.956990] ? vmalloc_sync_all+0x30/0x30 [ 467.961144] ? _raw_spin_unlock_irq+0x27/0x70 [ 467.965642] ? finish_task_switch+0x1ca/0x820 [ 467.970146] ? syscall_return_slowpath+0x5c0/0x5c0 [ 467.975084] ? syscall_return_slowpath+0x30f/0x5c0 2018/04/05 10:23:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x2, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x2c) 2018/04/05 10:23:31 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x5, 0x0, 0x1, 0x1000000000000004, 0x20}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000071100000000000eaffffff0000000000950000000000001c"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) 2018/04/05 10:23:31 executing program 2: socketpair(0x15, 0x5, 0x80009c01, &(0x7f00000001c0)) 2018/04/05 10:23:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x2c) 2018/04/05 10:23:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x200000000000000, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}, 0x2c) [ 467.980029] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 467.985411] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 467.990266] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 467.995457] RIP: 0033:0x4552d9 [ 467.998644] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 468.006363] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 468.013636] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 468.020909] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 468.028185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 468.035466] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000037 [ 468.042928] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory clntXX 2018/04/05 10:23:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:32 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:32 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x2c) 2018/04/05 10:23:32 executing program 2: socketpair(0x15, 0x5, 0x8000f801, &(0x7f00000001c0)) 2018/04/05 10:23:32 executing program 6 (fault-call:4 fault-nth:56): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:32 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:32 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0xc1}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000007110000000000000000000000000000095000000000000001e2de4f09883ed87ca15a1cf90724c2c98b48844b38bb6dec33e6e3e18bbe354ad02f3088a5882ced1bb8cb5dc2e1c0000000000000000f327a10da0207f1fdd472ac102cb246e9c35bc578dd3daf134e75797867087e172593e83dd18673eb20e309a37fe"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x50, &(0x7f0000000200)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) [ 468.769637] FAULT_INJECTION: forcing a failure. [ 468.769637] name failslab, interval 1, probability 0, space 0, times 0 [ 468.781687] CPU: 0 PID: 32715 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 468.788533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.797888] Call Trace: [ 468.800492] dump_stack+0x1b9/0x29f [ 468.804140] ? arch_local_irq_restore+0x52/0x52 [ 468.808827] should_fail.cold.4+0xa/0x1a [ 468.812899] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/05 10:23:32 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg(r1, &(0x7f0000000c80)={&(0x7f00000007c0)=@can, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000840)=""/8, 0x8}, {&(0x7f0000000880)=""/238, 0xee}, {&(0x7f0000000980)=""/205, 0xcd}, {&(0x7f0000000a80)=""/20, 0x14}, {&(0x7f0000000ac0)=""/115, 0x73}], 0x5, &(0x7f0000000bc0)=""/138, 0x8a, 0x100}, 0x2000) close(r0) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000040)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000000c0)=""/205, 0xcd}, {&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000200)=""/233, 0xe9}, {&(0x7f0000000300)=""/3, 0x3}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/30, 0x1e}, {&(0x7f0000000440)=""/40, 0x28}, {&(0x7f0000000480)=""/136, 0x88}, {&(0x7f0000000540)=""/188, 0xbc}, {&(0x7f0000000600)=""/172, 0xac}], 0xa, 0x0, 0x0, 0xf3}, 0x10002) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000d00)={r0, 0x28, &(0x7f0000000cc0)}, 0x10) sendmsg$kcm(r1, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000ac0)}, 0x0) 2018/04/05 10:23:32 executing program 2: socketpair(0x15, 0x5, 0x800000a6, &(0x7f00000001c0)) 2018/04/05 10:23:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0xffffffff00000000, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:32 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000]}, 0x2c) [ 468.818026] ? graph_lock+0x170/0x170 [ 468.821859] ? debug_check_no_locks_freed+0x310/0x310 [ 468.827101] ? find_held_lock+0x36/0x1c0 [ 468.831184] ? __lock_is_held+0xb5/0x140 [ 468.835355] ? check_same_owner+0x320/0x320 [ 468.839693] ? rcu_note_context_switch+0x710/0x710 [ 468.844639] ? lock_downgrade+0x8e0/0x8e0 [ 468.848806] should_failslab+0x124/0x180 [ 468.852898] kmem_cache_alloc+0x2af/0x760 [ 468.857071] __d_alloc+0xc1/0xc00 [ 468.860540] ? shrink_dcache_for_umount+0x290/0x290 [ 468.865577] ? d_alloc_parallel+0x1e80/0x1e80 [ 468.870089] ? lock_release+0xa10/0xa10 [ 468.874077] ? mark_held_locks+0xc9/0x160 [ 468.878243] ? d_lookup+0x254/0x330 [ 468.882681] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 468.887712] ? d_lookup+0x219/0x330 [ 468.891355] d_alloc+0x8e/0x370 [ 468.894648] ? __d_alloc+0xc00/0xc00 [ 468.898389] ? full_name_hash+0xc0/0x100 [ 468.902464] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 468.907745] ? down_write_nested+0x8b/0x120 [ 468.912077] ? rpc_d_lookup_sb+0x1a0/0x1a0 2018/04/05 10:23:32 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000]}, 0x2c) 2018/04/05 10:23:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x400000000000000) [ 468.916325] ? _down_write_nest_lock+0x120/0x120 [ 468.921105] rpc_mkpipe_dentry+0xf6/0x3a0 [ 468.925266] rpc_fill_super+0x6e5/0xbb0 [ 468.929252] ? rpc_pipe_release+0xb70/0xb70 [ 468.933584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 468.939128] ? security_capable+0xa4/0xd0 [ 468.943284] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 468.948848] ? ns_capable_common+0x13f/0x170 [ 468.953265] mount_ns+0x12a/0x1d0 [ 468.956722] ? rpc_pipe_release+0xb70/0xb70 [ 468.961048] rpc_mount+0x9e/0xd0 [ 468.964426] mount_fs+0xae/0x328 [ 468.967802] vfs_kern_mount.part.34+0xd4/0x4d0 [ 468.972408] ? may_umount+0xb0/0xb0 [ 468.976041] ? _raw_read_unlock+0x22/0x30 [ 468.980196] ? __get_fs_type+0x97/0xc0 [ 468.984097] do_mount+0x564/0x3070 [ 468.987652] ? copy_mount_string+0x40/0x40 [ 468.991897] ? rcu_pm_notify+0xc0/0xc0 [ 468.995803] ? copy_mount_options+0x5f/0x380 [ 469.000222] ? rcu_read_lock_sched_held+0x108/0x120 [ 469.005245] ? kmem_cache_alloc_trace+0x616/0x780 [ 469.010096] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 469.015638] ? _copy_from_user+0xdf/0x150 [ 469.019797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 469.025346] ? copy_mount_options+0x285/0x380 [ 469.029860] ksys_mount+0x12d/0x140 [ 469.033580] SyS_mount+0x35/0x50 [ 469.036949] ? ksys_mount+0x140/0x140 [ 469.040758] do_syscall_64+0x29e/0x9d0 [ 469.044651] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 469.049499] ? syscall_return_slowpath+0x5c0/0x5c0 [ 469.054431] ? syscall_return_slowpath+0x30f/0x5c0 [ 469.059375] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 469.064749] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 469.069610] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 469.074799] RIP: 0033:0x4552d9 [ 469.077993] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 469.085713] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 469.092991] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 469.100264] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 469.107537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 469.114822] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000038 2018/04/05 10:23:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x2c) 2018/04/05 10:23:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x100000000000000) 2018/04/05 10:23:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:33 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000240)=r1, 0x4) recvmsg(r0, &(0x7f000000e600)={&(0x7f000000d3c0)=@can={0x0, 0x0}, 0x80, &(0x7f000000e580)=[{&(0x7f000000d440)=""/135, 0x87}, {&(0x7f000000d500)=""/120, 0x78}, {&(0x7f000000d580)=""/4096, 0x1000}], 0x3, &(0x7f000000e5c0)=""/15, 0xf, 0x6}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xe, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc7a, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7c1, 0x0, 0x0, 0x0, 0x10001}, @initr0={0x18, 0x0, 0x0, 0x0, 0x94}], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x99, &(0x7f00000000c0)=""/153, 0x1, 0x0, [], r2}, 0x48) 2018/04/05 10:23:33 executing program 6 (fault-call:4 fault-nth:57): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:33 executing program 2: socketpair(0x15, 0x5, 0x8000f001, &(0x7f00000001c0)) 2018/04/05 10:23:33 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530c0", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:33 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0x2c) 2018/04/05 10:23:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x8cffffff00000000) [ 469.946940] FAULT_INJECTION: forcing a failure. [ 469.946940] name failslab, interval 1, probability 0, space 0, times 0 [ 469.958679] CPU: 1 PID: 300 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 469.965354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.974709] Call Trace: [ 469.977306] dump_stack+0x1b9/0x29f [ 469.980948] ? arch_local_irq_restore+0x52/0x52 [ 469.985634] should_fail.cold.4+0xa/0x1a [ 469.989710] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/05 10:23:33 executing program 2: socketpair(0x15, 0x5, 0x8000015b, &(0x7f00000001c0)) 2018/04/05 10:23:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 469.994830] ? graph_lock+0x170/0x170 [ 469.998642] ? debug_check_no_locks_freed+0x310/0x310 [ 470.003848] ? find_held_lock+0x36/0x1c0 [ 470.007942] ? __lock_is_held+0xb5/0x140 [ 470.012027] ? check_same_owner+0x320/0x320 [ 470.016361] ? rcu_note_context_switch+0x710/0x710 [ 470.021299] ? lock_downgrade+0x8e0/0x8e0 [ 470.025461] should_failslab+0x124/0x180 [ 470.029537] kmem_cache_alloc+0x2af/0x760 [ 470.033708] __d_alloc+0xc1/0xc00 [ 470.037174] ? shrink_dcache_for_umount+0x290/0x290 [ 470.042203] ? d_alloc_parallel+0x1e80/0x1e80 [ 470.046716] ? lock_release+0xa10/0xa10 [ 470.050705] ? mark_held_locks+0xc9/0x160 [ 470.054866] ? d_lookup+0x254/0x330 [ 470.058507] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 470.063534] ? d_lookup+0x219/0x330 [ 470.067171] d_alloc+0x8e/0x370 [ 470.070464] ? __d_alloc+0xc00/0xc00 [ 470.074191] ? full_name_hash+0xc0/0x100 [ 470.078277] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 470.083669] ? down_write_nested+0x8b/0x120 [ 470.088000] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 470.092244] ? _down_write_nest_lock+0x120/0x120 2018/04/05 10:23:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0xf6ffffff00000000) 2018/04/05 10:23:33 executing program 2: socketpair(0x15, 0x5, 0x80000901, &(0x7f00000001c0)) 2018/04/05 10:23:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 470.097015] rpc_mkpipe_dentry+0xf6/0x3a0 [ 470.101173] rpc_fill_super+0x6e5/0xbb0 [ 470.105158] ? rpc_pipe_release+0xb70/0xb70 [ 470.109487] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 470.115034] ? security_capable+0xa4/0xd0 [ 470.119191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 470.124737] ? ns_capable_common+0x13f/0x170 [ 470.129157] mount_ns+0x12a/0x1d0 [ 470.132617] ? rpc_pipe_release+0xb70/0xb70 [ 470.136937] rpc_mount+0x9e/0xd0 [ 470.140310] mount_fs+0xae/0x328 [ 470.143691] vfs_kern_mount.part.34+0xd4/0x4d0 [ 470.148282] ? may_umount+0xb0/0xb0 [ 470.151913] ? _raw_read_unlock+0x22/0x30 [ 470.156064] ? __get_fs_type+0x97/0xc0 [ 470.159967] do_mount+0x564/0x3070 [ 470.163521] ? copy_mount_string+0x40/0x40 [ 470.167765] ? rcu_pm_notify+0xc0/0xc0 [ 470.171667] ? copy_mount_options+0x5f/0x380 [ 470.176082] ? rcu_read_lock_sched_held+0x108/0x120 [ 470.181109] ? kmem_cache_alloc_trace+0x616/0x780 [ 470.185961] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 470.191508] ? _copy_from_user+0xdf/0x150 [ 470.195667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 470.201217] ? copy_mount_options+0x285/0x380 [ 470.205726] ksys_mount+0x12d/0x140 [ 470.209363] SyS_mount+0x35/0x50 [ 470.212736] ? ksys_mount+0x140/0x140 [ 470.216549] do_syscall_64+0x29e/0x9d0 [ 470.220435] ? vmalloc_sync_all+0x30/0x30 [ 470.224586] ? _raw_spin_unlock_irq+0x27/0x70 [ 470.229083] ? finish_task_switch+0x1ca/0x820 [ 470.233589] ? syscall_return_slowpath+0x5c0/0x5c0 [ 470.238526] ? syscall_return_slowpath+0x30f/0x5c0 [ 470.243470] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 470.248846] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 470.253716] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 470.258909] RIP: 0033:0x4552d9 [ 470.262100] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 470.269813] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 470.277085] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 470.284358] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 470.291631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 470.298907] R13: 00000000000003fa R14: 00000000006f9010 R15: 0000000000000039 2018/04/05 10:23:34 executing program 2: socketpair(0x15, 0x5, 0x8000fb00, &(0x7f00000001c0)) 2018/04/05 10:23:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x83, 0x80, 0x4, 0x0, 0xffffffffffffffff, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000001140)={0xf, 0x0, 0x10001, 0x10000, 0x1, r0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0xb, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000181000af", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x80000001, 0x1000, &(0x7f00000000c0)=""/4096}, 0x48) 2018/04/05 10:23:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800]}, 0x2c) 2018/04/05 10:23:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x4000000) 2018/04/05 10:23:34 executing program 6 (fault-call:4 fault-nth:58): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:34 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:34 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 471.015234] FAULT_INJECTION: forcing a failure. [ 471.015234] name failslab, interval 1, probability 0, space 0, times 0 [ 471.026577] CPU: 0 PID: 343 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 471.033254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.042612] Call Trace: [ 471.045221] dump_stack+0x1b9/0x29f [ 471.048863] ? arch_local_irq_restore+0x52/0x52 [ 471.053542] ? graph_lock+0x170/0x170 [ 471.057365] should_fail.cold.4+0xa/0x1a 2018/04/05 10:23:34 executing program 2: socketpair(0x15, 0x5, 0x8000dd01, &(0x7f00000001c0)) 2018/04/05 10:23:34 executing program 2: socketpair(0x15, 0x5, 0x800000b8, &(0x7f00000001c0)) [ 471.061437] ? perf_trace_lock_acquire+0xe3/0x980 [ 471.066298] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 471.071428] ? perf_trace_lock+0x900/0x900 [ 471.075680] ? graph_lock+0x170/0x170 [ 471.079495] ? graph_lock+0x170/0x170 [ 471.083320] ? find_held_lock+0x36/0x1c0 [ 471.087395] ? __lock_is_held+0xb5/0x140 [ 471.091477] ? check_same_owner+0x320/0x320 [ 471.095808] ? rcu_note_context_switch+0x710/0x710 [ 471.100755] should_failslab+0x124/0x180 [ 471.104825] kmem_cache_alloc+0x2af/0x760 [ 471.108992] ? rpc_i_callback+0x30/0x30 2018/04/05 10:23:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x2c) [ 471.112979] rpc_alloc_inode+0x1a/0x20 [ 471.117138] alloc_inode+0x63/0x190 [ 471.120779] new_inode_pseudo+0x69/0x1a0 [ 471.124851] ? prune_icache_sb+0x1a0/0x1a0 [ 471.129096] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 471.133693] ? d_instantiate_no_diralias+0x240/0x240 [ 471.138808] ? kasan_check_write+0x14/0x20 [ 471.143050] ? do_raw_spin_lock+0xc1/0x200 [ 471.147298] new_inode+0x1c/0x40 [ 471.150674] rpc_get_inode+0x1e/0x1f0 [ 471.154480] ? d_drop+0x51/0x60 [ 471.157769] __rpc_create_common+0x5d/0x190 2018/04/05 10:23:34 executing program 2: socketpair(0x15, 0x5, 0x80000010, &(0x7f00000001c0)) [ 471.162107] rpc_mkpipe_dentry+0x14f/0x3a0 [ 471.166358] rpc_fill_super+0x6e5/0xbb0 [ 471.170347] ? rpc_pipe_release+0xb70/0xb70 [ 471.174681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 471.180228] ? security_capable+0xa4/0xd0 [ 471.184385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 471.189938] ? ns_capable_common+0x13f/0x170 [ 471.194358] mount_ns+0x12a/0x1d0 [ 471.197816] ? rpc_pipe_release+0xb70/0xb70 [ 471.202149] rpc_mount+0x9e/0xd0 [ 471.205526] mount_fs+0xae/0x328 [ 471.208905] vfs_kern_mount.part.34+0xd4/0x4d0 2018/04/05 10:23:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000]}, 0x2c) [ 471.213498] ? may_umount+0xb0/0xb0 [ 471.217127] ? _raw_read_unlock+0x22/0x30 [ 471.221279] ? __get_fs_type+0x97/0xc0 [ 471.225176] do_mount+0x564/0x3070 [ 471.228826] ? copy_mount_string+0x40/0x40 [ 471.233066] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 471.238093] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 471.242858] ? retint_kernel+0x10/0x10 [ 471.246762] ? copy_mount_options+0x1f0/0x380 [ 471.251259] ? copy_mount_options+0x202/0x380 [ 471.255934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 471.261479] ? copy_mount_options+0x285/0x380 2018/04/05 10:23:34 executing program 2: socketpair(0x15, 0x5, 0x80005301, &(0x7f00000001c0)) 2018/04/05 10:23:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x2c) [ 471.265993] ksys_mount+0x12d/0x140 [ 471.269633] SyS_mount+0x35/0x50 [ 471.273002] ? ksys_mount+0x140/0x140 [ 471.276815] do_syscall_64+0x29e/0x9d0 [ 471.280705] ? vmalloc_sync_all+0x30/0x30 [ 471.284857] ? _raw_spin_unlock_irq+0x27/0x70 [ 471.289355] ? finish_task_switch+0x1ca/0x820 [ 471.293859] ? syscall_return_slowpath+0x5c0/0x5c0 [ 471.298797] ? syscall_return_slowpath+0x30f/0x5c0 [ 471.303736] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 471.309106] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/05 10:23:34 executing program 2: socketpair(0x15, 0x5, 0x8000f600, &(0x7f00000001c0)) [ 471.314055] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 471.319247] RIP: 0033:0x4552d9 [ 471.322433] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 471.330150] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 471.337427] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 471.344707] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 471.351981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 471.359257] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000003a 2018/04/05 10:23:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x8cffffff) [ 471.366756] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry gssd [ 471.390180] net/sunrpc/rpc_pipe.c: rpc_mkpipe_dentry() failed to create pipe clntXX/gssd (errno = -12) 2018/04/05 10:23:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x2c) 2018/04/05 10:23:35 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0)="8e0771728ca45714097b3d40c37a672e06b5a7b0ce2e2d82ceb6b0421603c1238f38af05a888175a6b300a0107517e9e3b8d83c5fca50d36de3f65d6e6eb4846f6d2735cb0e36bb4abb043bb77f7f4a5a93575db040ff12d91668b69003b947fb1b038b2bc21ef9e3cc06f1e653479026a1eae31847694bcecdfc6475f8375aa2e7c06b2508a0869df62c635fd2fc913cf95e7044e4ab8d574e5d93ab2f9f5a87b5dc1879efed9e42ff72f9242d95ff5e33f46a458fd9e41d09ee36338777da2ac812432764f2fa63faa2f1e4936f7eae3eb5c60426f75", &(0x7f00000006c0)=""/4096}, 0x18) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='btrfs\x00', 0x0, &(0x7f00000001c0)) 2018/04/05 10:23:35 executing program 2: socketpair(0x15, 0x5, 0x8000f800, &(0x7f00000001c0)) 2018/04/05 10:23:35 executing program 6 (fault-call:4 fault-nth:59): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 2018/04/05 10:23:35 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/05 10:23:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0xffffff8c) 2018/04/05 10:23:35 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0xf2, &(0x7f0000000200), 0x12d, &(0x7f0000000000)=""/251, 0xffffffffffffffc9}, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 472.098707] FAULT_INJECTION: forcing a failure. [ 472.098707] name failslab, interval 1, probability 0, space 0, times 0 [ 472.110399] CPU: 0 PID: 396 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 472.117073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.126427] Call Trace: [ 472.129026] dump_stack+0x1b9/0x29f [ 472.132669] ? arch_local_irq_restore+0x52/0x52 [ 472.137347] ? print_usage_bug+0xc0/0xc0 [ 472.142036] should_fail.cold.4+0xa/0x1a [ 472.146117] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 472.151324] ? graph_lock+0x170/0x170 [ 472.155141] ? find_held_lock+0x36/0x1c0 [ 472.159219] ? __lock_is_held+0xb5/0x140 [ 472.163302] ? check_same_owner+0x320/0x320 [ 472.167636] ? rcu_note_context_switch+0x710/0x710 [ 472.172581] ? lock_downgrade+0x8e0/0x8e0 [ 472.176751] should_failslab+0x124/0x180 [ 472.180823] kmem_cache_alloc+0x2af/0x760 [ 472.184998] __d_alloc+0xc1/0xc00 [ 472.188470] ? shrink_dcache_for_umount+0x290/0x290 [ 472.193508] ? d_alloc_parallel+0x1e80/0x1e80 [ 472.198024] ? lock_release+0xa10/0xa10 [ 472.202015] ? mark_held_locks+0xc9/0x160 [ 472.206352] ? d_lookup+0x254/0x330 [ 472.209989] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 472.215012] ? d_lookup+0x219/0x330 [ 472.218652] d_alloc+0x8e/0x370 [ 472.221938] ? __d_alloc+0xc00/0xc00 [ 472.225657] ? full_name_hash+0xc0/0x100 [ 472.229735] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 472.235019] ? down_write_nested+0x8b/0x120 [ 472.239352] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 472.243593] ? _down_write_nest_lock+0x120/0x120 [ 472.248361] ? rpc_d_lookup_sb+0x115/0x1a0 [ 472.252615] rpc_mkpipe_dentry+0xf6/0x3a0 [ 472.256778] nfs4blocklayout_register_sb+0x4b/0x70 [ 472.261715] rpc_pipefs_event+0x38d/0x570 [ 472.265876] ? bl_pipe_downcall+0x490/0x490 [ 472.270204] ? rcu_note_context_switch+0x710/0x710 [ 472.275147] notifier_call_chain+0x178/0x380 [ 472.279581] ? unregister_die_notifier+0x20/0x20 [ 472.284351] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 472.289558] ? _raw_spin_unlock+0x22/0x30 [ 472.293719] blocking_notifier_call_chain+0x139/0x170 2018/04/05 10:23:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0xfffffff6) 2018/04/05 10:23:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, 0x2c) 2018/04/05 10:23:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:35 executing program 2: socketpair(0x15, 0x5, 0x80001701, &(0x7f00000001c0)) 2018/04/05 10:23:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x1000000) 2018/04/05 10:23:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x2c) 2018/04/05 10:23:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/05 10:23:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4, 0x14}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x50, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x15, &(0x7f00000000c0)}, 0xffffffffffffff9e) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) [ 472.298921] ? srcu_init_notifier_head+0xa0/0xa0 [ 472.303699] rpc_fill_super+0x5a0/0xbb0 [ 472.307684] ? rpc_pipe_release+0xb70/0xb70 [ 472.312013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.317577] ? security_capable+0xa4/0xd0 [ 472.321733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.327273] ? ns_capable_common+0x13f/0x170 [ 472.331695] mount_ns+0x12a/0x1d0 [ 472.335151] ? rpc_pipe_release+0xb70/0xb70 [ 472.339481] rpc_mount+0x9e/0xd0 [ 472.342858] mount_fs+0xae/0x328 [ 472.346236] vfs_kern_mount.part.34+0xd4/0x4d0 [ 472.350827] ? may_umount+0xb0/0xb0 [ 472.354456] ? _raw_read_unlock+0x22/0x30 [ 472.358606] ? __get_fs_type+0x97/0xc0 [ 472.362505] do_mount+0x564/0x3070 [ 472.366061] ? copy_mount_string+0x40/0x40 [ 472.370306] ? rcu_pm_notify+0xc0/0xc0 [ 472.374210] ? copy_mount_options+0x5f/0x380 [ 472.378627] ? rcu_read_lock_sched_held+0x108/0x120 [ 472.383651] ? kmem_cache_alloc_trace+0x616/0x780 [ 472.388505] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 472.394059] ? _copy_from_user+0xdf/0x150 2018/04/05 10:23:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x7, 0x4000000000000004, 0x0, 0x1934, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x2c) [ 472.398219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.403761] ? copy_mount_options+0x285/0x380 [ 472.408266] ksys_mount+0x12d/0x140 [ 472.411902] SyS_mount+0x35/0x50 [ 472.415271] ? ksys_mount+0x140/0x140 [ 472.419079] do_syscall_64+0x29e/0x9d0 [ 472.422969] ? vmalloc_sync_all+0x30/0x30 [ 472.427126] ? _raw_spin_unlock_irq+0x27/0x70 [ 472.431624] ? finish_task_switch+0x1ca/0x820 [ 472.436130] ? syscall_return_slowpath+0x5c0/0x5c0 [ 472.441071] ? syscall_return_slowpath+0x30f/0x5c0 [ 472.446013] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 472.451388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 472.456249] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 472.461442] RIP: 0033:0x4552d9 [ 472.464632] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 472.472350] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 472.479763] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 472.487043] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 472.495017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 472.502427] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000003b [ 472.559142] list_del corruption. prev->next should be 00000000f577ea00, but was 00000000b8ae1788 [ 472.569497] ------------[ cut here ]------------ [ 472.574266] kernel BUG at lib/list_debug.c:53! [ 472.578977] invalid opcode: 0000 [#1] SMP KASAN [ 472.583655] Dumping ftrace buffer: [ 472.587187] (ftrace buffer empty) [ 472.590896] Modules linked in: [ 472.594095] CPU: 1 PID: 396 Comm: syz-executor6 Not tainted 4.16.0+ #1 [ 472.600754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.610112] RIP: 0010:__list_del_entry_valid.cold.1+0x48/0x58 [ 472.615995] RSP: 0018:ffff8801ba20f748 EFLAGS: 00010286 [ 472.621407] RAX: 0000000000000054 RBX: ffff8801a2839820 RCX: 0000000000000000 [ 472.628662] RDX: 0000000000000054 RSI: ffffffff815f7bf1 RDI: ffffed0037441edf [ 472.635928] RBP: ffff8801ba20f760 R08: ffff8801b81f4280 R09: ffffed003b624fb0 [ 472.643185] R10: ffffed003b624fb0 R11: ffff8801db127d87 R12: ffff8801c94319a0 [ 472.650438] R13: ffff8801c956b260 R14: ffff8801ba20f838 R15: dffffc0000000000 [ 472.657694] FS: 00007fe87b1df700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 472.666161] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 472.672025] CR2: 00007f8f9b2c7028 CR3: 00000001d68db000 CR4: 00000000001406e0 [ 472.679454] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 472.686706] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 472.693956] Call Trace: [ 472.696537] __dentry_kill+0x295/0x770 [ 472.700409] ? check_and_drop+0x1b0/0x1b0 [ 472.704542] ? do_raw_spin_lock+0x200/0x200 [ 472.708848] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 472.714025] dput.part.25+0x6f9/0x9a0 [ 472.717810] ? d_path+0x9c0/0x9c0 [ 472.721246] ? rpc_show_info+0x4c0/0x4c0 [ 472.725288] ? d_delete+0x1bb/0x2d0 [ 472.729245] dput+0x1f/0x30 [ 472.732161] rpc_fill_super+0x882/0xbb0 [ 472.736121] ? rpc_pipe_release+0xb70/0xb70 [ 472.740429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.745952] ? security_capable+0xa4/0xd0 [ 472.750083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.755606] ? ns_capable_common+0x13f/0x170 [ 472.760027] mount_ns+0x12a/0x1d0 [ 472.763503] ? rpc_pipe_release+0xb70/0xb70 [ 472.767817] rpc_mount+0x9e/0xd0 [ 472.771168] mount_fs+0xae/0x328 [ 472.774520] vfs_kern_mount.part.34+0xd4/0x4d0 [ 472.779085] ? may_umount+0xb0/0xb0 [ 472.782699] ? _raw_read_unlock+0x22/0x30 [ 472.786828] ? __get_fs_type+0x97/0xc0 [ 472.790712] do_mount+0x564/0x3070 [ 472.794238] ? copy_mount_string+0x40/0x40 [ 472.798457] ? rcu_pm_notify+0xc0/0xc0 [ 472.802332] ? copy_mount_options+0x5f/0x380 [ 472.806725] ? rcu_read_lock_sched_held+0x108/0x120 [ 472.811723] ? kmem_cache_alloc_trace+0x616/0x780 [ 472.816550] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 472.822071] ? _copy_from_user+0xdf/0x150 [ 472.826202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.831724] ? copy_mount_options+0x285/0x380 [ 472.836205] ksys_mount+0x12d/0x140 [ 472.839816] SyS_mount+0x35/0x50 [ 472.843164] ? ksys_mount+0x140/0x140 [ 472.846951] do_syscall_64+0x29e/0x9d0 [ 472.850822] ? vmalloc_sync_all+0x30/0x30 [ 472.854960] ? _raw_spin_unlock_irq+0x27/0x70 [ 472.859442] ? finish_task_switch+0x1ca/0x820 [ 472.863920] ? syscall_return_slowpath+0x5c0/0x5c0 [ 472.868832] ? syscall_return_slowpath+0x30f/0x5c0 [ 472.873750] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 472.879115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 472.883953] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 472.889128] RIP: 0033:0x4552d9 [ 472.892561] RSP: 002b:00007fe87b1dec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 472.900252] RAX: ffffffffffffffda RBX: 00007fe87b1df6d4 RCX: 00000000004552d9 [ 472.907523] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 472.914775] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 472.922026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 472.929278] R13: 00000000000003fa R14: 00000000006f9010 R15: 000000000000003b [ 472.936532] Code: a0 1a d8 87 e8 4a c1 2c fe 0f 0b 48 89 de 48 c7 c7 c0 1b d8 87 e8 39 c1 2c fe 0f 0b 48 89 de 48 c7 c7 60 1b d8 87 e8 28 c1 2c fe <0f> 0b 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 41 [ 472.956461] RIP: __list_del_entry_valid.cold.1+0x48/0x58 RSP: ffff8801ba20f748 [ 472.963985] ---[ end trace d1629348697b3c06 ]--- [ 472.968784] Kernel panic - not syncing: Fatal exception [ 472.974633] Dumping ftrace buffer: [ 472.978158] (ftrace buffer empty) [ 472.981844] Kernel Offset: disabled [ 472.985451] Rebooting in 86400 seconds..