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"}, {0x60, 0x102, 0x1ff, "d885c3636cebad3caf621e4f7df0ef286051dedba7ab10b30acec0f0f018769d7e9dce656792bcb751452a7bca81df4f3b62afbf96374ccf56d830d5703b27a969650ece4d7cafba5ae3"}, {0x50, 0x114, 0x4, "028f1c4225ccb4f574435292284e3f3f7d75de4f593052ce5ca9552b2aaf9ce91c6373831d9607cd91a1aef5c9dd8f312a7755bf7274e9b49b2b9428ec95d281"}], 0x1238, 0xc000}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0x5, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001580)={r6, &(0x7f0000001540)="a5e6", &(0x7f0000008240)=""/4096}, 0x18) sendmsg(r2, &(0x7f00000011c0)={&(0x7f0000000c80)=@generic={0x8, "1b55bf64b8f0e09e9923396e18195ea56287a938ec6bbe7031760772507db00f4d3d9486e5134d3d074857a7ab9617818b6d7f3344e573cebf5c795e55413a39d5fc62b7d1b112d7a955145ccf4db7739db04208934584d98ffdcda4ccacbf6b2ce0f851b438677ef80b3c1fba0705ccc5f566bfc501c513029cdf87e045"}, 0x80, &(0x7f0000001080)=[{&(0x7f0000000d00)="3cec874498c06040a1f39d82a58edf35d18abfbb4b5286848da163633b079c6c5632a48dbcababe88401b10c123b4bbbe03961f56da658207975d0e7792e0c397034536ecd5df4cc8e619b0f67df913c05640762ddf5be59c30e4ca2c9299217322c443127752b268157afecc084048c2a35f8a88a23faef0285f4ee5bc41006a37bd22bb86cef132743579112fe353bec7fe7e3ff5b50f3104af840abfdcb48d7b72f8699c5f5ac12f33af337575017972b1d9f63d0b361b7f5c9d9815fd0697827e82c722e99a5dfcfe347875d8ca7cff9866f0a16bdc773c91bd50236a4d182004a1b00dac7a813f8", 0xea}, {&(0x7f0000000e00)="e8ad45d10807b283e49b8f8602b4f8eaa4b548a6185e4cd214a51127bc4b5374d8db239cc6c6ad82fbd300a60d33ffc34491ffce4552b07b464bdb28c455d1a63c20806fe2cba1d57966b5f114af25bfca0f7b7342f1463f20adc49c84cea558079fbdbe4a929607005f3bedc831ea376a6e0f4dc9bade1b1fccbba22b78508964db3860620ee16aa839223c7c8cf312fd9afe0927f0243b1a54a1fbd5d214fcd2bef2cd727fa0cbe46ea83469f6721821aeb9289f59c4fc52bfa797e74758933ee4408908af5bb66238ad2fceb8985f4720a8868d36f9c35bccd1ce52c5fb9e0d801e6e0fbc0e68debad49423", 0xed}, {&(0x7f0000000b80)="50ae4079e26733b1764fa8afe000e1e23534a7982c7abbedb5da700c3eaf85487f9df8fa82668fedc6d121a3d7dea95f8e022641b6254ca23245e364", 0x3c}, {&(0x7f0000000f00)="1aa094af11b020fe7d975f94d27c56bb69024c7bb82fb0114de5f5001fdbd8f668217d65a84c60673480da3cf75fc12e346a2dc597d570da02b7480433af607c0bafea9d8389f9abd2d72ec8619fdde166b38fc54aa4e1d789752a6da55048438edc8c9000488e93079b9e165422a73e2d99064e4856de4289e691e272741b70a5ba8d2bdff86202c5ee6e28d93b37960506d9f8b2eabf8ca6bba1f111186ba5", 0xa0}], 0x4, &(0x7f00000010c0)=[{0x90, 0x13b, 0x0, "a459e34cadd3bc85de84e756bbd35347b456631e86c2eae1e7c6d4cdcdfbd87b5e4f4fe47b65614f17b0d2a09cbf2af9228d33fff070e3aa41867bcf1c1f32ea797fd6ed0f92ad832e519785835bcda883e0edd28fb9dd0d781560df88433d846127f23bb97f1984eca2755299ef20d73e05821f89b1b15b69e5d0c7c7"}, {0x38, 0x1ff, 0x20, "1e0fe30e3deecf26d5cbee165b6babcf7f87c5c01f50bf5954d201c807ac10e12af821c518e9"}], 0xc8, 0xc0}, 0x20000004) 2018/03/30 19:08:53 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:53 executing program 1: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:53 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x0, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1382.740748] FAULT_INJECTION: forcing a failure. [ 1382.740748] name failslab, interval 1, probability 0, space 0, times 0 [ 1382.752296] CPU: 1 PID: 3779 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1382.759499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1382.768850] Call Trace: [ 1382.771448] dump_stack+0x194/0x24d [ 1382.775081] ? arch_local_irq_restore+0x53/0x53 [ 1382.779763] should_fail+0x8c0/0xa40 [ 1382.783484] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 1382.788503] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1382.793616] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1382.798805] ? __lock_acquire+0x664/0x3e00 [ 1382.803028] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1382.808211] ? find_held_lock+0x35/0x1d0 [ 1382.812259] ? __lock_is_held+0xb6/0x140 [ 1382.816651] ? check_same_owner+0x320/0x320 [ 1382.820950] ? __d_lookup+0x4f4/0x830 [ 1382.824732] ? rcu_note_context_switch+0x710/0x710 [ 1382.829640] should_failslab+0xec/0x120 [ 1382.833594] kmem_cache_alloc+0x47/0x760 [ 1382.837634] __d_alloc+0xc1/0xbd0 [ 1382.841717] ? shrink_dcache_for_umount+0x290/0x290 [ 1382.846712] ? d_alloc_parallel+0x1b40/0x1b40 [ 1382.851188] ? lock_release+0xa40/0xa40 [ 1382.855141] ? mark_held_locks+0xaf/0x100 [ 1382.859266] ? d_lookup+0x133/0x2e0 [ 1382.862872] ? d_lookup+0x1d5/0x2e0 [ 1382.866479] d_alloc+0x8e/0x340 [ 1382.869734] ? __d_alloc+0xbd0/0xbd0 [ 1382.873427] ? full_name_hash+0x9b/0xe0 [ 1382.877385] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1382.882638] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1382.886854] rpc_populate.constprop.15+0xa3/0x340 [ 1382.891680] rpc_fill_super+0x379/0xae0 [ 1382.895645] ? cap_capable+0x1b5/0x230 [ 1382.899509] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1382.904679] ? security_capable+0x8e/0xc0 [ 1382.908804] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1382.913976] ? ns_capable_common+0xcf/0x160 [ 1382.918274] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1382.923441] mount_ns+0xc4/0x190 [ 1382.926787] rpc_mount+0x9e/0xd0 [ 1382.930131] mount_fs+0x66/0x2d0 [ 1382.933477] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1382.938038] ? may_umount+0xa0/0xa0 [ 1382.941641] ? _raw_read_unlock+0x22/0x30 [ 1382.945764] ? __get_fs_type+0x8a/0xc0 [ 1382.949628] do_mount+0xea4/0x2bb0 [ 1382.953145] ? copy_mount_string+0x40/0x40 [ 1382.957358] ? rcu_pm_notify+0xc0/0xc0 [ 1382.961226] ? copy_mount_options+0x5f/0x2e0 [ 1382.965611] ? rcu_read_lock_sched_held+0x108/0x120 [ 1382.970605] ? kmem_cache_alloc_trace+0x459/0x740 [ 1382.975423] ? kasan_check_write+0x14/0x20 [ 1382.979636] ? copy_mount_options+0x1f7/0x2e0 [ 1382.984109] SyS_mount+0xab/0x120 [ 1382.987538] ? copy_mnt_ns+0xb30/0xb30 [ 1382.991405] do_syscall_64+0x281/0x940 [ 1382.995266] ? vmalloc_sync_all+0x30/0x30 [ 1382.999391] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 1383.004990] ? syscall_return_slowpath+0x550/0x550 [ 1383.009897] ? syscall_return_slowpath+0x2ac/0x550 [ 1383.014803] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1383.020149] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1383.024968] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1383.030132] RIP: 0033:0x454e79 [ 1383.033307] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 19:08:54 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:54 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1383.040987] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1383.048230] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1383.055473] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1383.062716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1383.069960] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000029 2018/03/30 19:08:54 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:54 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x9, 0x80000001, 0x5, 0x1, 0x0, 0x3f, 0x808, 0x0, 0x1, 0x0, 0xfff, 0x1f, 0x1, 0xfffffffffffffffb, 0x4, 0x10001, 0x1, 0xfffffffffffffffe, 0xffffffffffffff12, 0x8, 0xfff, 0x4b, 0x8, 0x0, 0x80, 0x7f, 0x1f, 0x4, 0x6, 0x6, 0x6, 0x0, 0x3, 0x0, 0x9, 0x8000, 0x0, 0xffffffffffffffff, 0x2, @perf_config_ext={0x3, 0x10000}, 0x20, 0x1, 0x6, 0x3, 0xfffffffffffffffa, 0x401, 0xe0}, 0x0, 0xa, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000040)='-\x00') ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xfff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)="5c766d6e65743124766d6e657431c82400") r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r2, 0x50, &(0x7f00000001c0)}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r1) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xef, 0xffffffffffffff2f, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) recvmsg(r4, &(0x7f000000e2c0)={&(0x7f000000ce80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f000000e200)=[{&(0x7f000000cf00)=""/148, 0x94}, {&(0x7f000000cfc0)=""/143, 0x8f}, {&(0x7f000000d080)=""/4096, 0x1000}, {&(0x7f000000e080)=""/85, 0x55}, {&(0x7f000000e100)=""/214, 0xd6}], 0x5, &(0x7f000000e280)=""/58, 0x3a, 0x1}, 0x60) sendmsg(r4, &(0x7f000000e6c0)={&(0x7f000000e300)=@ll={0x11, 0xf, r5, 0x1, 0x3, 0x6}, 0x80, &(0x7f000000e680)=[{&(0x7f000000e380)="f5c232735f35884f5aa6a708fa277618dcb3ae4fca782b9e012c45f30584131b51a585ee4721407b029d6d10f7c5c1337d638588156cc18af90077f76f77d9b8133ef7", 0x43}, {&(0x7f000000e400)="c3d5ad475ce594e76cb7635f9a8d50bd9496af2a63354b9767c38cb7f746a6faa6b0d91e67f6aa0e508a175c94953f6d17736ca8c9cdb6560565bd2c1da5cb784261aa624091240150d04b1fd76b7ab5ce295ecffdc4d257b3fef443194136c74647d54c5618034b2549cafc6440741e2c07186109a254a3eaadaa292e6b7b9547fb475a", 0x84}, {&(0x7f000000e4c0)="b7355ecdc22df8559c0ee4131c5de0984e010816291d2714102c268a62295e95bf33e1af19b08a3f190530b0faed77866ecb11e7afbfd16a793992deddf007a6796abfed3df82c76a190fe3640e88db973c7e0599a3cee25b7c0a13ce22a84f5c82b8f8fbbd4ab3215dc5e59fca37d7fb0bc482f12cedd4ae512b2f7b385dac4a9c97dc38f10b7072ac94b96681bb52cbb26aeb08f617605765d57d3ebf05d16e480559c7383c8a8b9f30946eafe6b48b8e7442a5cf32aed15988e6ab225bf88bf29323931e0acd578bb8616b11df040d96a2ede0039970f5a5b799ed3be91d016ed71b0b8757559d414007f56452ae063f0a681959458", 0xf7}, {&(0x7f000000e5c0)="c6f7800f1cb19a627a3645fd227ed14d62f708205953e828f9f5573bd63649902678d60ce75496eb442005d026a5e9d9b38d8088d0737b9cec04558d771af26808709eefb70e79f0f600f5793fb8925f80c636403afe612da258438a5426d06fe6c555ae749af39e069cdb751d657abec7fd70cdc83beac84ee91f240b6411c98b32fe2f79eeb752bfc368b56cbd", 0x8e}], 0x4, 0x0, 0x0, 0x400c0}, 0x4000080) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) [ 1383.099243] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:08:54 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x0, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:54 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r2, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r5 = gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r4, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r4}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r4, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:54 executing program 5 (fault-call:11 fault-nth:42): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) [ 1383.339665] FAULT_INJECTION: forcing a failure. [ 1383.339665] name failslab, interval 1, probability 0, space 0, times 0 [ 1383.350980] CPU: 0 PID: 3835 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1383.358172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1383.367519] Call Trace: [ 1383.370101] dump_stack+0x194/0x24d [ 1383.373722] ? arch_local_irq_restore+0x53/0x53 [ 1383.378386] should_fail+0x8c0/0xa40 [ 1383.382092] ? perf_trace_lock_acquire+0xe3/0x980 [ 1383.386916] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1383.392000] ? trace_event_raw_event_lock+0x340/0x340 [ 1383.397179] ? perf_trace_lock+0x900/0x900 [ 1383.401392] ? mark_held_locks+0xaf/0x100 [ 1383.405523] ? __raw_spin_lock_init+0x1c/0x100 [ 1383.410259] ? find_held_lock+0x35/0x1d0 [ 1383.414307] ? __lock_is_held+0xb6/0x140 [ 1383.418360] ? check_same_owner+0x320/0x320 [ 1383.422661] ? d_alloc+0x269/0x340 [ 1383.426181] ? rcu_note_context_switch+0x710/0x710 [ 1383.431105] should_failslab+0xec/0x120 [ 1383.435060] kmem_cache_alloc+0x47/0x760 [ 1383.439102] ? d_drop+0x51/0x60 [ 1383.442361] ? rpc_i_callback+0x30/0x30 [ 1383.446334] rpc_alloc_inode+0x1a/0x20 [ 1383.450210] alloc_inode+0x65/0x180 [ 1383.453820] new_inode_pseudo+0x69/0x190 [ 1383.457949] ? prune_icache_sb+0x1a0/0x1a0 [ 1383.462165] ? do_raw_spin_trylock+0x190/0x190 [ 1383.466813] ? d_add+0xa70/0xa70 [ 1383.470163] new_inode+0x1c/0x40 [ 1383.473510] rpc_get_inode+0x20/0x1e0 [ 1383.477292] __rpc_create_common+0x5d/0x1d0 [ 1383.481598] rpc_populate.constprop.15+0x1ad/0x340 [ 1383.486517] rpc_fill_super+0x379/0xae0 [ 1383.490561] ? cap_capable+0x1b5/0x230 [ 1383.494449] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1383.499623] ? security_capable+0x8e/0xc0 [ 1383.503750] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1383.508922] ? ns_capable_common+0xcf/0x160 [ 1383.513223] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1383.518477] mount_ns+0xc4/0x190 [ 1383.521827] rpc_mount+0x9e/0xd0 [ 1383.525176] mount_fs+0x66/0x2d0 [ 1383.528529] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1383.533090] ? may_umount+0xa0/0xa0 [ 1383.536697] ? _raw_read_unlock+0x22/0x30 [ 1383.540823] ? __get_fs_type+0x8a/0xc0 [ 1383.544696] do_mount+0xea4/0x2bb0 [ 1383.548222] ? copy_mount_string+0x40/0x40 [ 1383.552437] ? rcu_pm_notify+0xc0/0xc0 [ 1383.556317] ? copy_mount_options+0x5f/0x2e0 [ 1383.560706] ? rcu_read_lock_sched_held+0x108/0x120 [ 1383.565701] ? kmem_cache_alloc_trace+0x459/0x740 [ 1383.570525] ? kasan_check_write+0x14/0x20 [ 1383.574754] ? _copy_from_user+0x99/0x110 [ 1383.578886] ? copy_mount_options+0x1f7/0x2e0 [ 1383.583362] SyS_mount+0xab/0x120 [ 1383.586791] ? copy_mnt_ns+0xb30/0xb30 [ 1383.590748] do_syscall_64+0x281/0x940 [ 1383.594616] ? vmalloc_sync_all+0x30/0x30 [ 1383.598742] ? _raw_spin_unlock_irq+0x27/0x70 [ 1383.603231] ? finish_task_switch+0x1c1/0x7e0 [ 1383.607704] ? syscall_return_slowpath+0x550/0x550 [ 1383.612621] ? syscall_return_slowpath+0x2ac/0x550 [ 1383.617528] ? prepare_exit_to_usermode+0x350/0x350 [ 1383.622523] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1383.628046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1383.632877] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1383.638044] RIP: 0033:0x454e79 [ 1383.641215] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1383.648903] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1383.656151] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1383.663400] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1383.670822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1383.678068] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002a [ 1383.685550] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfs [ 1383.707678] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:08:54 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:54 executing program 1: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:54 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:54 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x0, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:54 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000d00)=ANY=[@ANYBLOB="180000000000000000000000000000000500000000a49700000000000000000400008e8eb89a0fe088d51ab61a8065c6b75ae90ab7198d2948502050375aaceb8daa94ef7a145d0ad8020003"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b80)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:54 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r2, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r5 = gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r4, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r4}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r4, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:54 executing program 5 (fault-call:11 fault-nth:43): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:08:54 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000004c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:55 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r2, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r5 = gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000280)=r4, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r4}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r4, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:55 executing program 1: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:55 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x0, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:55 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 1383.844273] FAULT_INJECTION: forcing a failure. [ 1383.844273] name failslab, interval 1, probability 0, space 0, times 0 [ 1383.855691] CPU: 0 PID: 3869 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1383.862885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1383.872236] Call Trace: [ 1383.874823] dump_stack+0x194/0x24d [ 1383.878450] ? arch_local_irq_restore+0x53/0x53 [ 1383.883126] should_fail+0x8c0/0xa40 [ 1383.886839] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 1383.891858] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1383.896961] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1383.902147] ? __lock_acquire+0x664/0x3e00 [ 1383.906384] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1383.911576] ? find_held_lock+0x35/0x1d0 [ 1383.915808] ? __lock_is_held+0xb6/0x140 [ 1383.919875] ? check_same_owner+0x320/0x320 [ 1383.924192] ? __d_lookup+0x4f4/0x830 [ 1383.928000] ? rcu_note_context_switch+0x710/0x710 [ 1383.932928] should_failslab+0xec/0x120 [ 1383.936891] kmem_cache_alloc+0x47/0x760 [ 1383.940938] __d_alloc+0xc1/0xbd0 [ 1383.944374] ? shrink_dcache_for_umount+0x290/0x290 [ 1383.949374] ? d_alloc_parallel+0x1b40/0x1b40 [ 1383.953858] ? lock_release+0xa40/0xa40 [ 1383.957833] ? mark_held_locks+0xaf/0x100 [ 1383.961976] ? d_lookup+0x133/0x2e0 [ 1383.965592] ? d_lookup+0x1d5/0x2e0 [ 1383.969195] d_alloc+0x8e/0x340 [ 1383.972449] ? __d_alloc+0xbd0/0xbd0 [ 1383.976135] ? full_name_hash+0x9b/0xe0 [ 1383.980089] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1383.985341] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1383.989559] rpc_populate.constprop.15+0xa3/0x340 [ 1383.994382] rpc_fill_super+0x379/0xae0 [ 1383.998335] ? cap_capable+0x1b5/0x230 [ 1384.002198] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1384.007367] ? security_capable+0x8e/0xc0 [ 1384.011981] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1384.017147] ? ns_capable_common+0xcf/0x160 [ 1384.021441] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1384.026607] mount_ns+0xc4/0x190 [ 1384.029946] rpc_mount+0x9e/0xd0 [ 1384.033285] mount_fs+0x66/0x2d0 [ 1384.036626] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1384.041182] ? may_umount+0xa0/0xa0 [ 1384.044782] ? _raw_read_unlock+0x22/0x30 [ 1384.048902] ? __get_fs_type+0x8a/0xc0 [ 1384.052765] do_mount+0xea4/0x2bb0 [ 1384.056287] ? copy_mount_string+0x40/0x40 [ 1384.060497] ? rcu_pm_notify+0xc0/0xc0 [ 1384.064366] ? copy_mount_options+0x5f/0x2e0 [ 1384.068746] ? rcu_read_lock_sched_held+0x108/0x120 [ 1384.073741] ? kmem_cache_alloc_trace+0x459/0x740 [ 1384.078564] ? kasan_check_write+0x14/0x20 [ 1384.082780] ? copy_mount_options+0x1f7/0x2e0 [ 1384.087257] SyS_mount+0xab/0x120 [ 1384.090683] ? copy_mnt_ns+0xb30/0xb30 [ 1384.094544] do_syscall_64+0x281/0x940 [ 1384.098403] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 1384.103917] ? syscall_return_slowpath+0x550/0x550 [ 1384.108837] ? syscall_return_slowpath+0x2ac/0x550 [ 1384.113751] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1384.119090] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1384.123908] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1384.129067] RIP: 0033:0x454e79 [ 1384.132228] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 19:08:55 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:55 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x0, 0xfedf, 0x5a, &(0x7f0000000d80)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0xfd92) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:55 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r1, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r3}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) [ 1384.139921] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1384.147162] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1384.154406] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1384.161647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1384.168887] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002b [ 1384.178204] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:08:55 executing program 5 (fault-call:11 fault-nth:44): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:08:55 executing program 0: socketpair(0x0, 0x0, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:55 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x0, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:55 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:55 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 1384.465674] FAULT_INJECTION: forcing a failure. [ 1384.465674] name failslab, interval 1, probability 0, space 0, times 0 [ 1384.476958] CPU: 1 PID: 3911 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1384.484142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1384.493494] Call Trace: [ 1384.496094] dump_stack+0x194/0x24d [ 1384.500419] ? arch_local_irq_restore+0x53/0x53 [ 1384.505093] should_fail+0x8c0/0xa40 [ 1384.509328] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1384.514434] ? __lock_is_held+0xb6/0x140 [ 1384.518498] ? mark_held_locks+0xaf/0x100 [ 1384.522643] ? __raw_spin_lock_init+0x1c/0x100 [ 1384.527225] ? find_held_lock+0x35/0x1d0 [ 1384.531286] ? __lock_is_held+0xb6/0x140 [ 1384.535349] ? check_same_owner+0x320/0x320 [ 1384.539662] ? d_alloc+0x269/0x340 [ 1384.543180] ? rcu_note_context_switch+0x710/0x710 [ 1384.548086] ? lock_release+0xa40/0xa40 [ 1384.552053] should_failslab+0xec/0x120 [ 1384.556020] kmem_cache_alloc+0x47/0x760 [ 1384.560062] ? d_drop+0x51/0x60 [ 1384.563314] ? rpc_i_callback+0x30/0x30 [ 1384.567258] rpc_alloc_inode+0x1a/0x20 [ 1384.571119] alloc_inode+0x65/0x180 [ 1384.574724] new_inode_pseudo+0x69/0x190 [ 1384.578759] ? prune_icache_sb+0x1a0/0x1a0 [ 1384.582970] ? do_raw_spin_trylock+0x190/0x190 [ 1384.587524] ? d_add+0xa70/0xa70 [ 1384.590864] new_inode+0x1c/0x40 [ 1384.594205] rpc_get_inode+0x20/0x1e0 [ 1384.597981] __rpc_create_common+0x5d/0x1d0 [ 1384.602277] rpc_populate.constprop.15+0x1ad/0x340 [ 1384.607183] rpc_fill_super+0x379/0xae0 [ 1384.611145] ? cap_capable+0x1b5/0x230 [ 1384.615031] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1384.620196] ? security_capable+0x8e/0xc0 [ 1384.624316] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1384.629482] ? ns_capable_common+0xcf/0x160 [ 1384.633785] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1384.638964] mount_ns+0xc4/0x190 [ 1384.642357] rpc_mount+0x9e/0xd0 [ 1384.645703] mount_fs+0x66/0x2d0 [ 1384.649047] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1384.653603] ? may_umount+0xa0/0xa0 [ 1384.657204] ? _raw_read_unlock+0x22/0x30 [ 1384.661352] ? __get_fs_type+0x8a/0xc0 [ 1384.665221] do_mount+0xea4/0x2bb0 [ 1384.668738] ? copy_mount_string+0x40/0x40 [ 1384.672945] ? rcu_pm_notify+0xc0/0xc0 [ 1384.676811] ? copy_mount_options+0x5f/0x2e0 [ 1384.681195] ? rcu_read_lock_sched_held+0x108/0x120 [ 1384.686187] ? kmem_cache_alloc_trace+0x459/0x740 [ 1384.691003] ? kasan_check_write+0x14/0x20 [ 1384.695226] ? _copy_from_user+0x99/0x110 [ 1384.699347] ? copy_mount_options+0x1f7/0x2e0 [ 1384.703817] SyS_mount+0xab/0x120 [ 1384.707240] ? copy_mnt_ns+0xb30/0xb30 [ 1384.711102] do_syscall_64+0x281/0x940 [ 1384.714962] ? vmalloc_sync_all+0x30/0x30 [ 1384.719090] ? _raw_spin_unlock_irq+0x27/0x70 [ 1384.723567] ? finish_task_switch+0x1c1/0x7e0 [ 1384.728040] ? syscall_return_slowpath+0x550/0x550 [ 1384.732941] ? syscall_return_slowpath+0x2ac/0x550 [ 1384.737842] ? prepare_exit_to_usermode+0x350/0x350 [ 1384.742833] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1384.748181] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1384.753007] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1384.758196] RIP: 0033:0x454e79 [ 1384.761360] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1384.769043] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1384.776306] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1384.783568] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1384.790837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1384.798085] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002c [ 1384.805584] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry portmap [ 1384.814958] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:08:56 executing program 1: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:56 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10f) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) socketpair$inet(0x2, 0x4, 0xb3, &(0x7f0000000440)) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x20000000000, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:56 executing program 0: socketpair(0x0, 0x0, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:56 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000000000000000000000000000000400e1ffffff000000000000000000009500000000000000ee1ea580e3a9d76814ffd01b0ab4e43e446ac8ab1844b59fe0bd13e76897f8599a6739264f599155805c80371336f14b50d30e71e9a9f8bc54a363ae36a18f40b3a74700f08e7fe9bde415bdbae80eebc643781c23f9efe9b0dc318db56c79e9bc09ad72f6ee9b675b6dd646a4fbc614a047d6ffe7a22fbd3dadae818386"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:56 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:56 executing program 5 (fault-call:11 fault-nth:45): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:08:56 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x0, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:56 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 1384.993176] FAULT_INJECTION: forcing a failure. [ 1384.993176] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.004598] CPU: 1 PID: 3959 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1385.011791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1385.021140] Call Trace: [ 1385.023729] dump_stack+0x194/0x24d [ 1385.027364] ? arch_local_irq_restore+0x53/0x53 [ 1385.032039] should_fail+0x8c0/0xa40 [ 1385.035752] ? unwind_next_frame.part.6+0x1a6/0xb40 2018/03/30 19:08:56 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:56 executing program 0: socketpair(0x0, 0x0, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:56 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x0, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:56 executing program 1: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x0, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:56 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:56 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 1385.040782] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1385.045893] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1385.051087] ? __lock_acquire+0x664/0x3e00 [ 1385.055409] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1385.060604] ? find_held_lock+0x35/0x1d0 [ 1385.064664] ? __lock_is_held+0xb6/0x140 [ 1385.068705] ? check_same_owner+0x320/0x320 [ 1385.073005] ? __d_lookup+0x4f4/0x830 [ 1385.076809] ? rcu_note_context_switch+0x710/0x710 [ 1385.081725] should_failslab+0xec/0x120 [ 1385.085691] kmem_cache_alloc+0x47/0x760 [ 1385.089730] __d_alloc+0xc1/0xbd0 [ 1385.093165] ? shrink_dcache_for_umount+0x290/0x290 [ 1385.098158] ? d_alloc_parallel+0x1b40/0x1b40 [ 1385.102642] ? lock_release+0xa40/0xa40 [ 1385.106596] ? mark_held_locks+0xaf/0x100 [ 1385.110728] ? d_lookup+0x133/0x2e0 [ 1385.114329] ? d_lookup+0x1d5/0x2e0 [ 1385.117939] d_alloc+0x8e/0x340 [ 1385.121208] ? __d_alloc+0xbd0/0xbd0 [ 1385.124921] ? full_name_hash+0x9b/0xe0 [ 1385.128874] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1385.134136] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1385.138370] rpc_populate.constprop.15+0xa3/0x340 [ 1385.143199] rpc_fill_super+0x379/0xae0 [ 1385.147157] ? cap_capable+0x1b5/0x230 [ 1385.151031] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1385.156195] ? security_capable+0x8e/0xc0 [ 1385.160320] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1385.165484] ? ns_capable_common+0xcf/0x160 [ 1385.169793] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1385.174955] mount_ns+0xc4/0x190 [ 1385.178295] rpc_mount+0x9e/0xd0 [ 1385.181633] mount_fs+0x66/0x2d0 [ 1385.184974] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1385.189536] ? may_umount+0xa0/0xa0 [ 1385.193140] ? _raw_read_unlock+0x22/0x30 [ 1385.197264] ? __get_fs_type+0x8a/0xc0 [ 1385.201133] do_mount+0xea4/0x2bb0 [ 1385.204645] ? copy_mount_string+0x40/0x40 [ 1385.208855] ? rcu_pm_notify+0xc0/0xc0 [ 1385.212718] ? copy_mount_options+0x5f/0x2e0 [ 1385.217098] ? rcu_read_lock_sched_held+0x108/0x120 [ 1385.222087] ? kmem_cache_alloc_trace+0x459/0x740 [ 1385.226903] ? kasan_check_write+0x14/0x20 [ 1385.231115] ? copy_mount_options+0x1f7/0x2e0 [ 1385.235593] SyS_mount+0xab/0x120 [ 1385.239032] ? copy_mnt_ns+0xb30/0xb30 [ 1385.242898] do_syscall_64+0x281/0x940 [ 1385.246762] ? vmalloc_sync_all+0x30/0x30 [ 1385.250889] ? _raw_spin_unlock_irq+0x27/0x70 [ 1385.255376] ? finish_task_switch+0x1c1/0x7e0 [ 1385.259844] ? syscall_return_slowpath+0x550/0x550 [ 1385.264746] ? syscall_return_slowpath+0x2ac/0x550 [ 1385.269653] ? prepare_exit_to_usermode+0x350/0x350 [ 1385.274648] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1385.279993] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1385.284813] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1385.289979] RIP: 0033:0x454e79 [ 1385.293249] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1385.300947] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1385.308196] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1385.315439] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1385.322686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1385.329935] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002d [ 1385.337730] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:08:56 executing program 5 (fault-call:11 fault-nth:46): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:08:56 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x0, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:56 executing program 7: mkdir(&(0x7f0000003140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x80006, 0x100000001, &(0x7f0000002d00)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002e40)={r1, &(0x7f0000002d40)="066694760bfcd9568fd4a96c2cc9b43c8f57fdcf6aaaf4ec8edbb4", &(0x7f0000002d80)="baeb1f7b930eec06d403d0b01fdf137d095cefed9cac05c37adb6c454ca8826b659c2c11801f0899ea30c0067c209d8baf13ed5e90a03fa74b1547a118b54111f889c006f64d10dc8e873eeff18226c02ffc66dcd0b2986c4f44862888baff93d3452fb50351e03722febdb355796ec26faf84177e7f64495f0dee3e562ba2d348b0f089928adeebb835411834a1331522b9cda00cbb2c71ffd15f058fb99e9193fde7ce9536ee48e7eeaa5a3dbdc6f52662ec94ea7a14eb6a", 0x1}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002c40)={&(0x7f0000002c00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='binfmt_misc\x00', 0x2, &(0x7f0000000440)="a20e263763ee05e5dc26c35e2792375a5eea08875d2660c1168382cde5e338ac676bbbe71db5d864992d49fa98ba3ef65e620575ca7f49a0dede94e3c24226c80469e46cd43eb88b03a6bede2fab80e3b2b3851c8e767424178c83b4dc724a886da2c0dab97d632b15f62e8f8e65da382b61b640ad15e9cf9b5ca85b44185963b7f400a1d87df51a2a11d8b648e012c339437e8f887d28b46adec49c7f69dd35d380cedf0ea49ae2474215a993b6d6d95641e2ee67c44447aba1fe43f598dd9c439f4a64f3110f1ad439147c09") socketpair(0x15, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)='sysv\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="0ae27bc735b9adc220c720fdf2f2e4941031f259fd386b84f832f0b4be9698f2908a53eef43aba5b20264d198c106a52e0b511a8f1eafd6ea6803d6623", &(0x7f0000000180)=""/234}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000380), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={r3, &(0x7f0000002ac0)="5b0213167ba87bb0e43160a2e0a0216e8436b9a16da43c300fb945606552efb6be4a1b182c12b37e9b92ee5057f0079c9372558d81b8b2bc4a2489402e1aad8f19f78238cf2a49f0e7138808408d1501d3dbb78ee67aa906db040e0636259c365ce9bbd0e3fd0c64", &(0x7f0000002b40)="f8dc9253e95b4841d7a785be0b09040a2be0ee5a60063bd240"}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002bc0)=0x80000000, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002cc0)={&(0x7f0000002c80)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(r3, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/217, 0xd9}, {&(0x7f0000001640)=""/51, 0x33}, {&(0x7f0000001680)=""/246, 0xf6}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x6, &(0x7f0000002880)=""/232, 0xe8, 0x7}, 0x10040) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000003040)=ANY=[@ANYBLOB="18000000000000100000000000000e0f35e77a6212db00000000000000007300950013569fb9e6c8e4bb659791827ec800000000200090c4a26a08ea00e978ca40771341b0e65e50d6a609ac26a65d0a05f5bc34ded7b109174030ee9ef9a749ea68dbb420fb63cddfe876c6c135cf52f1b88e58fa0f"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r4, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f00000030c0)='./file0/bus\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) 2018/03/30 19:08:56 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x0, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:56 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x0, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:56 executing program 0: socketpair(0x0, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:56 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x4e) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b80)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:56 executing program 1: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x0, 0x338d, 0x7}, 0x2c) [ 1385.637688] FAULT_INJECTION: forcing a failure. [ 1385.637688] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.649115] CPU: 0 PID: 4015 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1385.656307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1385.665658] Call Trace: [ 1385.668251] dump_stack+0x194/0x24d [ 1385.671885] ? arch_local_irq_restore+0x53/0x53 [ 1385.676551] should_fail+0x8c0/0xa40 [ 1385.680248] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 1385.685246] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1385.690334] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1385.695500] ? __lock_acquire+0x664/0x3e00 [ 1385.699710] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1385.704874] ? find_held_lock+0x35/0x1d0 [ 1385.708909] ? __lock_is_held+0xb6/0x140 [ 1385.712949] ? check_same_owner+0x320/0x320 [ 1385.717243] ? __d_lookup+0x4f4/0x830 [ 1385.721025] ? rcu_note_context_switch+0x710/0x710 [ 1385.725932] should_failslab+0xec/0x120 [ 1385.729881] kmem_cache_alloc+0x47/0x760 [ 1385.733921] __d_alloc+0xc1/0xbd0 [ 1385.737347] ? shrink_dcache_for_umount+0x290/0x290 [ 1385.742336] ? d_alloc_parallel+0x1b40/0x1b40 [ 1385.746809] ? lock_release+0xa40/0xa40 [ 1385.750760] ? mark_held_locks+0xaf/0x100 [ 1385.754886] ? d_lookup+0x133/0x2e0 [ 1385.758489] ? d_lookup+0x1d5/0x2e0 [ 1385.762092] d_alloc+0x8e/0x340 [ 1385.765350] ? __d_alloc+0xbd0/0xbd0 [ 1385.769042] ? full_name_hash+0x9b/0xe0 [ 1385.772995] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1385.778248] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1385.782463] rpc_populate.constprop.15+0xa3/0x340 [ 1385.787285] rpc_fill_super+0x379/0xae0 [ 1385.791237] ? cap_capable+0x1b5/0x230 [ 1385.795097] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1385.800261] ? security_capable+0x8e/0xc0 [ 1385.804391] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1385.809647] ? ns_capable_common+0xcf/0x160 [ 1385.813946] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1385.819108] mount_ns+0xc4/0x190 [ 1385.822450] rpc_mount+0x9e/0xd0 [ 1385.825791] mount_fs+0x66/0x2d0 [ 1385.829131] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1385.833688] ? may_umount+0xa0/0xa0 [ 1385.837291] ? _raw_read_unlock+0x22/0x30 [ 1385.841429] ? __get_fs_type+0x8a/0xc0 [ 1385.845293] do_mount+0xea4/0x2bb0 [ 1385.848810] ? copy_mount_string+0x40/0x40 [ 1385.853026] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1385.858036] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1385.862767] ? retint_kernel+0x10/0x10 [ 1385.866633] ? copy_mount_options+0x18b/0x2e0 [ 1385.871099] ? copy_mount_options+0x196/0x2e0 [ 1385.875568] ? copy_mount_options+0x1f7/0x2e0 [ 1385.880036] SyS_mount+0xab/0x120 [ 1385.883461] ? copy_mnt_ns+0xb30/0xb30 [ 1385.887320] do_syscall_64+0x281/0x940 [ 1385.891179] ? vmalloc_sync_all+0x30/0x30 [ 1385.895302] ? _raw_spin_unlock_irq+0x27/0x70 [ 1385.899771] ? finish_task_switch+0x1c1/0x7e0 [ 1385.904253] ? syscall_return_slowpath+0x550/0x550 [ 1385.909158] ? syscall_return_slowpath+0x2ac/0x550 [ 1385.914061] ? prepare_exit_to_usermode+0x350/0x350 [ 1385.919049] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1385.924395] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1385.929215] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1385.934379] RIP: 0033:0x454e79 [ 1385.937542] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1385.945222] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1385.952463] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1385.959705] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1385.966947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1385.974192] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002e 2018/03/30 19:08:57 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x0, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:57 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x0, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 1385.995368] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:08:57 executing program 0: socketpair(0x0, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:57 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x0, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:57 executing program 1: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x0, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:57 executing program 0: socketpair(0x0, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:57 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x0, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:57 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:57 executing program 5 (fault-call:11 fault-nth:47): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:08:57 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=ANY=[@ANYBLOB="180000000000ff000000000000000000050000000000000000000000000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000c80)="c6e7b454e8fb706914ab2759b0e0d219fe9d62953e7913fdc9b33027d6e74f5189f96dc037c0cec70f1d29c7268b3e4491798f3bc98a4fa0e8de88c0f0625e1909ac379fb0fe92c6c5140786f3b7e1f90237cb8fceaa0ea5f11ba1a0703c688ced0ae876658fba59294ce58c933379a61a8841509084f5b9eee957a4bea2c3ff760874cc084caf64a02668e4ea9c159913100106eb1d880999d7f28834b88ff2e7c476ceded9190fb271661014399a632c957f967d0c7fb8aac22f636242c64b3bd8e94bae0ddb452272723923b3a972c9b250f18362e10788cf6bb5030d24f3dabb545c8e4aba79", &(0x7f0000000d80)=""/254}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:57 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x0, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:57 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x0, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 1386.381561] FAULT_INJECTION: forcing a failure. [ 1386.381561] name failslab, interval 1, probability 0, space 0, times 0 [ 1386.392945] CPU: 1 PID: 4072 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1386.400134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1386.409484] Call Trace: [ 1386.412072] dump_stack+0x194/0x24d [ 1386.415704] ? arch_local_irq_restore+0x53/0x53 [ 1386.420379] should_fail+0x8c0/0xa40 [ 1386.424091] ? unwind_next_frame.part.6+0x1a6/0xb40 2018/03/30 19:08:57 executing program 1: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x0, 0x7}, 0x2c) 2018/03/30 19:08:57 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f00000017c0)=ANY=[@ANYBLOB="18000000000000000000833395a300000000000005c62be9db000000000000f99f5b1115de17b95d6b61282a00000000009500000015c182f5e77a1296b7522798eef012c3f37badd97beb52b3892d201d513e9e706cdddae499fb9e"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000008040)={&(0x7f0000003e00)=@can={0x0, 0x0}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000003e80)=""/220, 0xdc}], 0x1, &(0x7f0000008000), 0x0, 0x5}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f0000008080)={0xb, 0x2, &(0x7f0000001740)=@raw=[@ldst={0x0, 0x3, 0x2, 0xf, 0x2, 0xfffffff8, 0x14d7acd72f553a0f}], &(0x7f0000001780)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000005000)=""/4096, 0x40f00, 0x1, [], r6}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r5, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r7}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) recvmsg(r0, &(0x7f0000000b80)={&(0x7f0000000c80)=@nfc, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)=""/163, 0xa3}, {&(0x7f0000000dc0)=""/73, 0x49}, {&(0x7f0000000e40)=""/152, 0x98}, {&(0x7f0000000f00)=""/190, 0xbe}], 0x4, &(0x7f0000001080)=""/128, 0x80, 0x5}, 0x2) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000001700)='selinux\x00') sendmsg(r4, &(0x7f00000016c0)={&(0x7f0000001100)=@nl=@unspec, 0x80, &(0x7f0000001240)=[{&(0x7f0000001180)="dd07a6ad1b7e400cf55d1ea2d88ceadb87fa95c9156a8551d82e67b61075520200815b366d4caa11ca04ff64d836241b492e00e2f6bc8199c95cd277a4b4f2fee368f0b24345129022814f050f1b5a710ab873586f2a52e80cc92a", 0x5b}, {&(0x7f0000001200)="af6cf374ee362af76593c071bef7cef809c14eb3b921d2917223d73473cb6e4e36f2d9ea2abd264a4e58a4630e45d935355eca939f12", 0x36}], 0x2, &(0x7f0000001280)=[{0xb0, 0x10c, 0x6, "2f695c7c35a963847387b8e4b25c48add70645b6be71fbf6b6b46bf4ca4ad4454b2ed036d0e696f135267db871f9d1a1249c23f29e2b35aacac624e5ea523e6da4a66ffd625c09946f2cabf4d9c7d76ec93688ff7b3f5d37589b336ffd56935c8f58cd6e6373e90921d3cd61aff8a16b55299bf99150e87d539341de2df16ab0fb5012e6d3ac14f7b56e18c0e2bc9f0be6bb16aba9b4e74d1ec40f686795a352"}, {0xe0, 0x111, 0x7853dba, "92ae6582ba0e0192b7d8ce8356229c118acf996afa5ae8413448d2886cf1b800cabd354232b988f5bc1dae468dc3a889879da3176640cf5bc242cddaafc53e5c41d4ddf04b02360f4aba7ec8ffbeeb4f956aba2b17b87cf6b719ca80fb2108e6583bc750930a82e5199400990d9ac8e5b8476636e1a01da847a6b386a89c306b9828ae5f5ae1429ce1fad08c985312380876dd21dc46e622018d78701602fdce36004b49eac8e1709c80bc3ee2f55e45ca4a3a4fd0bf576a31426a5b4c75eec459e5dd17086ecbf66ae2"}, {0xd0, 0x115, 0x3, "1159b6525ea5f4c588a581333aa249b20e7329537bf9cdaa5f3c68934728e464b3d0f73afcdc51165ada70508c3871f4818de970604b9fe71765f1c6e29dc160c1b4afad3619db78b3413ee916b974f2f4efb2579ece24619a596f113f0f3742b414bf6208c8c01191c20d62bdc2be619540b2517ec367a30c97b600f6c6dbd4b4f3e8528fcc0feb800df05eb0c42c35d02cd465e16cb28dc54b151c07a8bbc48140addd7e27c10acb9297dec209b5ea9bc1ef39bac98aba1b"}, {0x68, 0x117, 0x29, "74efa798ec6e3ed5a8b47c59404abe8a2371888d2f49d72fb5a566fd8bd321f344f6c6a7ba8e78224195877ec86528f81fc7403f38999f310be73f3fb28c5b18f48b7694c5140891fd81acb085ebfd286b18aa"}, {0xb0, 0x11e, 0xffffffff00000000, "39044001105e6d642e0f557154778586573103ac1b903e62e400d379811f6c48c75e923137c75c5a5304982b89ac1d57e032a89a120987d9c79cc64e533c3c227d150e1c26cb4eee5dc9a7b0278dd079f857b0b407e4a35df4686c308a958a66d62a65667880ead646abc121122331879198bff81bbe861d12601d386ad8a446c615d2524ada744c76fdcb8bc5b484b255193482da70f5baf68331079478"}, {0xa8, 0x1ff, 0x3, "e82365f85332dbf62d562869ec6030721059153f85447a6ee56a1127c2bf284c161fd4ba01debfac6002f4af03e1b22fc66e19aea1bbf7abd86147ff8cec2adb20ac5ce8b0479eaf9c3cf2296e4368ceb113646e3f6d1579a9f70beac9119a1f0d50ef27cd1bd7e3034e7a51e11ec4cf5f51bfcda1ed734ab017e0c424ff09594ee3a0873f41388c2ecaf390f0d9b610a6633d1f4f"}], 0x420, 0x1}, 0x4008000) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r8, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7, 0x10, 0xffffffffffffffff, 0x5}, 0x2c) [ 1386.429099] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1386.434204] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1386.439393] ? __lock_acquire+0x664/0x3e00 [ 1386.443622] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1386.448814] ? find_held_lock+0x35/0x1d0 [ 1386.452878] ? __lock_is_held+0xb6/0x140 [ 1386.456947] ? check_same_owner+0x320/0x320 [ 1386.461262] ? __d_lookup+0x4f4/0x830 [ 1386.465322] ? rcu_note_context_switch+0x710/0x710 [ 1386.470256] should_failslab+0xec/0x120 [ 1386.474230] kmem_cache_alloc+0x47/0x760 [ 1386.478291] __d_alloc+0xc1/0xbd0 [ 1386.481743] ? shrink_dcache_for_umount+0x290/0x290 [ 1386.486756] ? d_alloc_parallel+0x1b40/0x1b40 [ 1386.491246] ? lock_release+0xa40/0xa40 [ 1386.495202] ? mark_held_locks+0xaf/0x100 [ 1386.499330] ? d_lookup+0x133/0x2e0 [ 1386.502942] ? d_lookup+0x1d5/0x2e0 [ 1386.506546] d_alloc+0x8e/0x340 [ 1386.509809] ? __d_alloc+0xbd0/0xbd0 [ 1386.513503] ? full_name_hash+0x9b/0xe0 [ 1386.517467] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1386.522720] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1386.526933] rpc_populate.constprop.15+0xa3/0x340 [ 1386.531752] rpc_fill_super+0x379/0xae0 [ 1386.535791] ? cap_capable+0x1b5/0x230 [ 1386.539659] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1386.544824] ? security_capable+0x8e/0xc0 [ 1386.548948] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1386.554113] ? ns_capable_common+0xcf/0x160 [ 1386.558409] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1386.563573] mount_ns+0xc4/0x190 [ 1386.566912] rpc_mount+0x9e/0xd0 [ 1386.570251] mount_fs+0x66/0x2d0 [ 1386.573592] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1386.578150] ? may_umount+0xa0/0xa0 [ 1386.581750] ? _raw_read_unlock+0x22/0x30 [ 1386.585871] ? __get_fs_type+0x8a/0xc0 [ 1386.589732] do_mount+0xea4/0x2bb0 [ 1386.593249] ? copy_mount_string+0x40/0x40 [ 1386.597460] ? rcu_pm_notify+0xc0/0xc0 [ 1386.601330] ? copy_mount_options+0x5f/0x2e0 [ 1386.605712] ? rcu_read_lock_sched_held+0x108/0x120 [ 1386.610701] ? kmem_cache_alloc_trace+0x459/0x740 [ 1386.615522] ? copy_mount_options+0x1f7/0x2e0 [ 1386.619995] SyS_mount+0xab/0x120 [ 1386.623422] ? copy_mnt_ns+0xb30/0xb30 [ 1386.627288] do_syscall_64+0x281/0x940 [ 1386.631147] ? vmalloc_sync_all+0x30/0x30 [ 1386.635269] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 1386.640780] ? syscall_return_slowpath+0x550/0x550 [ 1386.645682] ? syscall_return_slowpath+0x2ac/0x550 [ 1386.650585] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1386.655934] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1386.660757] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1386.665919] RIP: 0033:0x454e79 [ 1386.669083] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 19:08:57 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000c80)=ANY=[@ANYBLOB="220000000000000000000000008000a2cd69f69e7905000000000000000000000000950000000006c90625f82d65db300da7fae722ff8a7beaa0b38686972ae4fb30f053835920b3df1836b7d27be14ec940d5001d7267090000004b65ca1d5aa9a915aac64c63a9167d5bdcfcf063280358bd22fd90510e81ffcbafe335b4e43e2fde63a83fc30813d260a1499e83f4037a712ccf1c97f44e786841ef2e073d8be8475043e209374486457466ac86982abc1bc28ad2759f27a059df940eee82abab4a7c96040583c3e0c90903aa936641f7f08bfda1c65a88134141c55db7ab"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r1, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") r3 = gettid() perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x7, 0x0, 0x3ff, 0x1, 0x0, 0x9, 0x40440, 0x8, 0xfff, 0x3ff, 0x0, 0x9, 0x4, 0xfa, 0x8001, 0x9, 0x0, 0x10001, 0x81, 0x101, 0x1dc, 0x10001, 0x1, 0xffffffffffffffb3, 0x7fffffff, 0x7, 0x7, 0x8000, 0x9, 0x6, 0x2, 0x1, 0x8, 0x1f, 0x8, 0x7ff, 0x0, 0x1, 0x2, @perf_config_ext={0x6, 0x864c}, 0x40, 0x9, 0x2, 0x4, 0x6, 0x100000001}, r3, 0x8, r0, 0x3) recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000440)={r0}) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:57 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1386.676773] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1386.684019] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1386.691261] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1386.698504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1386.705832] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002f [ 1386.714838] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:08:58 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x0, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:58 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800)}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:58 executing program 5 (fault-call:11 fault-nth:48): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) [ 1386.959379] FAULT_INJECTION: forcing a failure. [ 1386.959379] name failslab, interval 1, probability 0, space 0, times 0 [ 1386.970851] CPU: 1 PID: 4124 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1386.978037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1386.987385] Call Trace: [ 1386.989974] dump_stack+0x194/0x24d [ 1386.993597] ? arch_local_irq_restore+0x53/0x53 [ 1386.998276] should_fail+0x8c0/0xa40 [ 1387.001981] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1387.007062] ? __lock_is_held+0xb6/0x140 [ 1387.011098] ? mark_held_locks+0xaf/0x100 [ 1387.015217] ? __raw_spin_lock_init+0x1c/0x100 [ 1387.019773] ? find_held_lock+0x35/0x1d0 [ 1387.023812] ? __lock_is_held+0xb6/0x140 [ 1387.027852] ? check_same_owner+0x320/0x320 [ 1387.032148] ? d_alloc+0x269/0x340 [ 1387.035664] ? rcu_note_context_switch+0x710/0x710 [ 1387.040570] ? lock_release+0xa40/0xa40 [ 1387.044521] should_failslab+0xec/0x120 [ 1387.048469] kmem_cache_alloc+0x47/0x760 [ 1387.052506] ? d_drop+0x51/0x60 [ 1387.055764] ? rpc_i_callback+0x30/0x30 [ 1387.059710] rpc_alloc_inode+0x1a/0x20 [ 1387.063571] alloc_inode+0x65/0x180 [ 1387.067170] new_inode_pseudo+0x69/0x190 [ 1387.071205] ? prune_icache_sb+0x1a0/0x1a0 [ 1387.075412] ? do_raw_spin_trylock+0x190/0x190 [ 1387.079968] ? d_add+0xa70/0xa70 [ 1387.083309] new_inode+0x1c/0x40 [ 1387.086651] rpc_get_inode+0x20/0x1e0 [ 1387.090433] __rpc_create_common+0x5d/0x1d0 [ 1387.094738] rpc_populate.constprop.15+0x1ad/0x340 [ 1387.099648] rpc_fill_super+0x379/0xae0 [ 1387.103610] ? cap_capable+0x1b5/0x230 [ 1387.107477] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1387.112642] ? security_capable+0x8e/0xc0 [ 1387.116770] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1387.121935] ? ns_capable_common+0xcf/0x160 [ 1387.126233] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1387.131415] mount_ns+0xc4/0x190 [ 1387.134757] rpc_mount+0x9e/0xd0 [ 1387.138097] mount_fs+0x66/0x2d0 [ 1387.141436] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1387.145991] ? may_umount+0xa0/0xa0 [ 1387.149596] ? _raw_read_unlock+0x22/0x30 [ 1387.153728] ? __get_fs_type+0x8a/0xc0 [ 1387.157595] do_mount+0xea4/0x2bb0 [ 1387.161110] ? copy_mount_string+0x40/0x40 [ 1387.165329] ? rcu_pm_notify+0xc0/0xc0 [ 1387.169193] ? copy_mount_options+0x5f/0x2e0 [ 1387.173575] ? rcu_read_lock_sched_held+0x108/0x120 [ 1387.178568] ? kmem_cache_alloc_trace+0x459/0x740 [ 1387.183382] ? kasan_check_write+0x14/0x20 [ 1387.187588] ? _copy_from_user+0x99/0x110 [ 1387.191715] ? copy_mount_options+0x1f7/0x2e0 [ 1387.196184] SyS_mount+0xab/0x120 [ 1387.199615] ? copy_mnt_ns+0xb30/0xb30 [ 1387.203474] do_syscall_64+0x281/0x940 [ 1387.207334] ? vmalloc_sync_all+0x30/0x30 [ 1387.211456] ? _raw_spin_unlock_irq+0x27/0x70 [ 1387.215922] ? finish_task_switch+0x1c1/0x7e0 [ 1387.220407] ? syscall_return_slowpath+0x550/0x550 [ 1387.225311] ? syscall_return_slowpath+0x2ac/0x550 [ 1387.230215] ? prepare_exit_to_usermode+0x350/0x350 [ 1387.235204] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1387.240540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1387.245357] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1387.250518] RIP: 0033:0x454e79 [ 1387.253680] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1387.261361] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1387.268603] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1387.275843] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1387.283086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1387.290327] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000030 [ 1387.297656] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfsd4_cb 2018/03/30 19:08:58 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x0, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:58 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000440)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:58 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800)}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:58 executing program 1: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x0, 0x7}, 0x2c) 2018/03/30 19:08:58 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=ANY=[@ANYBLOB="1800000001000000000000000000000005000000f600000000000000000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:58 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1387.307271] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:08:58 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x0, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:58 executing program 5 (fault-call:11 fault-nth:49): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) [ 1387.445329] FAULT_INJECTION: forcing a failure. [ 1387.445329] name failslab, interval 1, probability 0, space 0, times 0 [ 1387.456764] CPU: 0 PID: 4155 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1387.463954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1387.473317] Call Trace: [ 1387.475906] dump_stack+0x194/0x24d [ 1387.479536] ? arch_local_irq_restore+0x53/0x53 [ 1387.484217] should_fail+0x8c0/0xa40 [ 1387.487930] ? unwind_next_frame.part.6+0x1a6/0xb40 2018/03/30 19:08:58 executing program 1: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x0, 0x7}, 0x2c) 2018/03/30 19:08:58 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800)}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:58 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000440)='bpf\x00', 0x2000000002000, &(0x7f0000000480)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:58 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x0, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) [ 1387.492946] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1387.498051] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1387.503257] ? __lock_acquire+0x664/0x3e00 [ 1387.507490] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1387.512680] ? find_held_lock+0x35/0x1d0 [ 1387.516747] ? __lock_is_held+0xb6/0x140 [ 1387.520813] ? check_same_owner+0x320/0x320 [ 1387.525120] ? __d_lookup+0x4f4/0x830 [ 1387.528896] ? rcu_note_context_switch+0x710/0x710 [ 1387.533816] should_failslab+0xec/0x120 [ 1387.537770] kmem_cache_alloc+0x47/0x760 [ 1387.541816] __d_alloc+0xc1/0xbd0 [ 1387.545246] ? shrink_dcache_for_umount+0x290/0x290 [ 1387.550239] ? d_alloc_parallel+0x1b40/0x1b40 [ 1387.554707] ? lock_release+0xa40/0xa40 [ 1387.558681] ? mark_held_locks+0xaf/0x100 [ 1387.562801] ? d_lookup+0x133/0x2e0 [ 1387.566402] ? d_lookup+0x1d5/0x2e0 [ 1387.570002] d_alloc+0x8e/0x340 [ 1387.573262] ? __d_alloc+0xbd0/0xbd0 [ 1387.576947] ? full_name_hash+0x9b/0xe0 [ 1387.580897] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1387.586149] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1387.590360] rpc_populate.constprop.15+0xa3/0x340 [ 1387.595178] rpc_fill_super+0x379/0xae0 [ 1387.599130] ? cap_capable+0x1b5/0x230 [ 1387.602989] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1387.608162] ? security_capable+0x8e/0xc0 [ 1387.612291] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1387.617459] ? ns_capable_common+0xcf/0x160 [ 1387.621762] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1387.626932] mount_ns+0xc4/0x190 [ 1387.630275] rpc_mount+0x9e/0xd0 [ 1387.633613] mount_fs+0x66/0x2d0 [ 1387.636953] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1387.641507] ? may_umount+0xa0/0xa0 [ 1387.645106] ? _raw_read_unlock+0x22/0x30 [ 1387.649227] ? __get_fs_type+0x8a/0xc0 [ 1387.653089] do_mount+0xea4/0x2bb0 [ 1387.656604] ? copy_mount_string+0x40/0x40 [ 1387.660810] ? rcu_pm_notify+0xc0/0xc0 [ 1387.664671] ? copy_mount_options+0x5f/0x2e0 [ 1387.669071] ? rcu_read_lock_sched_held+0x108/0x120 [ 1387.674153] ? kmem_cache_alloc_trace+0x459/0x740 [ 1387.678978] ? kasan_check_write+0x14/0x20 [ 1387.683184] ? _copy_from_user+0x99/0x110 [ 1387.687304] ? copy_mount_options+0x1f7/0x2e0 [ 1387.691770] SyS_mount+0xab/0x120 [ 1387.695194] ? copy_mnt_ns+0xb30/0xb30 [ 1387.699060] do_syscall_64+0x281/0x940 [ 1387.702918] ? vmalloc_sync_all+0x30/0x30 [ 1387.707051] ? _raw_spin_unlock_irq+0x27/0x70 [ 1387.711519] ? finish_task_switch+0x1c1/0x7e0 [ 1387.715987] ? syscall_return_slowpath+0x550/0x550 [ 1387.720894] ? syscall_return_slowpath+0x2ac/0x550 [ 1387.725796] ? prepare_exit_to_usermode+0x350/0x350 [ 1387.730787] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1387.736124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1387.740941] entry_SYSCALL_64_after_hwframe+0x42/0xb7 mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:58 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000b80)={&(0x7f00000000c0)='./file0\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:58 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1387.746102] RIP: 0033:0x454e79 [ 1387.749271] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1387.756957] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1387.764199] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1387.771443] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1387.778687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1387.785930] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000031 2018/03/30 19:08:59 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x0, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 1387.795476] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:08:59 executing program 5 (fault-call:11 fault-nth:50): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:08:59 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x0, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:59 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x0, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:59 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:59 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x0, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:59 executing program 1: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d}, 0x2c) [ 1388.070324] FAULT_INJECTION: forcing a failure. [ 1388.070324] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.081657] CPU: 0 PID: 4203 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1388.088851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1388.098197] Call Trace: [ 1388.100770] dump_stack+0x194/0x24d [ 1388.104389] ? arch_local_irq_restore+0x53/0x53 [ 1388.109043] should_fail+0x8c0/0xa40 [ 1388.112732] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 1388.117725] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1388.122894] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1388.128057] ? __lock_acquire+0x664/0x3e00 [ 1388.132265] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1388.137428] ? find_held_lock+0x35/0x1d0 [ 1388.141465] ? __lock_is_held+0xb6/0x140 [ 1388.145505] ? check_same_owner+0x320/0x320 [ 1388.149800] ? __d_lookup+0x4f4/0x830 [ 1388.153589] ? rcu_note_context_switch+0x710/0x710 [ 1388.158495] should_failslab+0xec/0x120 [ 1388.162446] kmem_cache_alloc+0x47/0x760 [ 1388.166500] __d_alloc+0xc1/0xbd0 [ 1388.169931] ? shrink_dcache_for_umount+0x290/0x290 [ 1388.174919] ? d_alloc_parallel+0x1b40/0x1b40 [ 1388.179390] ? lock_release+0xa40/0xa40 [ 1388.183339] ? mark_held_locks+0xaf/0x100 [ 1388.187462] ? d_lookup+0x133/0x2e0 [ 1388.191074] ? d_lookup+0x1d5/0x2e0 [ 1388.194676] d_alloc+0x8e/0x340 [ 1388.197932] ? __d_alloc+0xbd0/0xbd0 [ 1388.201618] ? full_name_hash+0x9b/0xe0 [ 1388.205571] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1388.210819] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1388.215034] rpc_populate.constprop.15+0xa3/0x340 [ 1388.219853] rpc_fill_super+0x379/0xae0 [ 1388.223804] ? cap_capable+0x1b5/0x230 [ 1388.227666] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1388.232830] ? security_capable+0x8e/0xc0 [ 1388.236951] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1388.242121] ? ns_capable_common+0xcf/0x160 [ 1388.246418] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1388.251581] mount_ns+0xc4/0x190 [ 1388.254922] rpc_mount+0x9e/0xd0 [ 1388.258261] mount_fs+0x66/0x2d0 [ 1388.261602] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1388.266676] ? may_umount+0xa0/0xa0 [ 1388.270278] ? _raw_read_unlock+0x22/0x30 [ 1388.274400] ? __get_fs_type+0x8a/0xc0 [ 1388.278264] do_mount+0xea4/0x2bb0 [ 1388.281800] ? copy_mount_string+0x40/0x40 [ 1388.286015] ? rcu_pm_notify+0xc0/0xc0 [ 1388.289881] ? copy_mount_options+0x5f/0x2e0 [ 1388.294263] ? rcu_read_lock_sched_held+0x108/0x120 [ 1388.299253] ? kmem_cache_alloc_trace+0x459/0x740 [ 1388.304070] ? kasan_check_write+0x14/0x20 [ 1388.308280] ? _copy_from_user+0x99/0x110 [ 1388.312401] ? copy_mount_options+0x1f7/0x2e0 [ 1388.316872] SyS_mount+0xab/0x120 [ 1388.320298] ? copy_mnt_ns+0xb30/0xb30 [ 1388.324158] do_syscall_64+0x281/0x940 [ 1388.328025] ? vmalloc_sync_all+0x30/0x30 [ 1388.332145] ? _raw_spin_unlock_irq+0x27/0x70 [ 1388.336614] ? finish_task_switch+0x1c1/0x7e0 [ 1388.341094] ? syscall_return_slowpath+0x550/0x550 [ 1388.346001] ? syscall_return_slowpath+0x2ac/0x550 [ 1388.350908] ? prepare_exit_to_usermode+0x350/0x350 [ 1388.355902] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1388.361240] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1388.366074] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/30 19:08:59 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000d80)='./file0/bus\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000001200)=ANY=[@ANYBLOB="18000000000000000000000000000000050000000000000000dfffffff000000950000000000000007d372bc148acc8c3e837fd4e3846c58ad47a610d7342a9ac68219a223f80236f2387ea56125718ce0ad36e677d051e5ee6cff4040dfb44b8fd70bf5845984c6506f9934d8975adf58991d499e5342e2e71d224c9b3dbcbf694bf56460ab81628ea6f2b3e41d05038f0bec1d23d6000000008000000000d76f4b30c9636f93bebe5cd2dec32288f329b86b0d1e0be5f15367b245860157e183056ac385b4d4adb32cedf524dd9ea003b0144ce191a0e351dd098f2872128271f49069f9ce95d929338ce980f264"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000e40)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d00)={r1, 0x50, &(0x7f0000000c80)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000d40)=r5, 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b80)={&(0x7f0000000880)='./file0/bus\x00'}, 0x10) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x16, &(0x7f0000026740), 0x7, 0x0, 0x0, 0x5ea}, 0x10005) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r6}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0xe, 0xe, &(0x7f0000000f00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x518, 0x0, 0x0, 0x0, 0x100000000}, @exit={0x95}, @alu={0x7, 0x1, 0x5, 0xa, 0x8, 0x1ead03c267005538, 0x1}, @jmp={0x5, 0x7fff, 0xb, 0x9, 0x4, 0xfffffff4, 0xfffffffffffffff0}, @exit={0x95}, @ldst={0x3, 0x2, 0x2, 0xa, 0x2, 0xffffffc0, 0xffffffffffffffff}, @jmp={0x5, 0xcfe, 0x6, 0x0, 0xf, 0x0, 0x4}], &(0x7f0000000f80)='GPL\x00', 0x3, 0xf0, &(0x7f0000001080)=""/240, 0x40f00, 0x1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r1, 0x28, &(0x7f0000000440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={r7, 0x80, 0x10}, 0xc) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000dc0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) [ 1388.371237] RIP: 0033:0x454e79 [ 1388.374402] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1388.382085] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1388.389330] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1388.396574] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1388.403815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1388.411060] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000032 [ 1388.483398] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:08:59 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000f00)=ANY=[@ANYBLOB="18000000001000000000000000000080050000000000001d0000000000000000fe4773773db1dc9159b941d31da83f65b3cee0c15e2f1b9ac7cb21ebc1d1a0641dba7e47f2f133f0452efdf58842fd67fb79e006bf75d8d24c432282139843039e943811832d201f8ed30ab4c36d0fa2388723b3d366f1559a46857437f2c189ecabfe534f67790506873f8b59cbda1175f11ce8"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) sendmsg(r1, &(0x7f0000000880)={&(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x4, 0x2, 0x2, 0x1, {0xa, 0x4e20, 0x5c947f96, @mcast1={0xff, 0x1, [], 0x1}, 0xf81}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000c80)="97f251534a0c501b615bce73624fcf71812201e214f4e32fe9b28cf90900c37b9e5a7a1d4b25d1089f3ac0d1912eec7989c3482253b6080ba9ecb4033637bd4d4f688fc378bd059e79474ce7f85d78d5553cea5b5c3cccdd17a9ef84817007cb26850b16b2aa543b2cebba48a39d54c62cb2aa1b8d0ba8af6f4feb5539171b5567cba58446248023f2536f9facd5e92f13", 0x91}, {&(0x7f0000000d40)="08dff43c8bb99146999e1aba8dfcb8702f4425e976d8cacba29099fb6991eb8d2461e126abf056e952242b64f4f4097f669623d6c51dfac41d6322b00d86fd29009aa54de32634c6d0cfae3caaafb8b7c34cc5f7c8f5677bd9d2499e35775dcdebb15a9f831effc047b14d6894bdb31bd4a76daadc7dd48b8fa805befcb03735a78f7f22e383c7197f05cdd1dbb497481a6d1cd68878d602d8f854163761100e498a6178b725e41c25f96f8dd60d1afeb0", 0xb1}, {&(0x7f0000000e00)="b7f9a001cd777d5a760257fca2c4df6a859aead30778bf68a8a89fb9ab7e1a1b989ebbdbcc7877ab2873d94591f00706120780b3ed122927a2bf8a88b5f18b64dcfd0a932d89f53dc82fa2485d456798028ab31bc681221dc97a980d1447e20828c8753984ab5847672feee358841b9335b15ae2e9bf55944d01077b93c9c4ab41d237192dda03aa47226ca0cc053eeabcda442d4048ffac0e64c12667011e5dabc8ec0a1e8fc400b3a29746c78a666b34a353813b694ddc082f60b663f5c642207b66a087d3ab178c", 0xc9}], 0x3, &(0x7f0000005000)=[{0x88, 0x17, 0x8000, "8252c889362eb2136a35b17c18712bb078a98f563a3e79e9f1925b220970b466cf043b33398d456b71d6d2c1e548619a2281c7751df42d340b4428bad8821d7cec0df5a94fecd13086e6f6b84769c88fda2acaa19bbf72fd4a825148d4d5783b26c7ce5362dd15d90eb14141847e4016a12b82d2ab09"}, {0xa8, 0x10f, 0x100000001, "320cd6036d367bd1ff02bfde9af31eb783697183afe63f7164bd051b60138eb5f9f90a2e70ce629c152a8d5daa5b79b4b19721d56c5bb122226f67f21e00aeee12241329bf0eae2eb4cded1de9db21aa722f47f65ae9655933a3bda97f8eb05a08760baf50e20d6d1e23cb0348469a1aeedbc5d7eded10d14ff3abfe100b80307217d6df593b7d3798b17df30b83094ff28ad0d300f7916a"}, {0xf8, 0x199, 0xec, "f9d6fcdcb9529b4761081febe8e4ee8fd693099796ca2ee034e34ac462d7108818b4498088dc799d452a51df6bf41409ae0f384d37996a8ec112bc09dc4985c3585420cd298f7387d7dc9ced3e8e9134965e667deeceecaf45808211d25f8c1087b83615bf38b6e3153af7ec408808204fd978c227874293d86301838c1c4ea21b3ddd35b044d4ecd346e9011041774e158a2754b4ff69e50169a32286b26a654550ac65a5bb4ea3f74b578bab2c49c1caf535ef0be764742fbfba114f1e225f9edddffc0411ae7c94b28c919ee4013def57de795f504a4d15aeb79f7018c0252aff2af6554633"}, {0x58, 0x11f, 0x80, "2fb7f3a82e7fc8e49b880711e8d30af16f29d080f239140568344049b9c181fcfec5fee52d085f55305d66b5ae22f12191749fcd3bc214e51d3185a4f60b2e42267b5803f3"}, {0x10, 0x114, 0x1f}, {0x1010, 0x10f, 0x5, "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"}, {0x90, 0xff, 0x9, "1c2044fc65adb3e5ce091db41872ca5d47f6cd66ceecd66b974ebdea9a86d78009efdd105965c071f6f9c2c900dd7acf806a5bd2bb7a403fdf8b95fa2645ad305f726372cd178c48904808eecafa873c5f7076362090bcfac89b8a22cd214ff60942b175e8359fc35d78c8c4abf9053df7e881a7d6e9bad5279a1d9ad3116727"}], 0x1330, 0x4004800}, 0x81) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001100)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) r6 = getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) socketpair$inet6(0xa, 0x804, 0x6, &(0x7f0000001180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f00000011c0)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001200)) perf_event_open(&(0x7f0000001080)={0x0, 0x70, 0x100000000, 0x100000001, 0x4, 0x7fffffff, 0x0, 0x5, 0x200, 0x8, 0x7, 0x2, 0x7f2, 0x2, 0x1, 0xb1, 0x0, 0x77, 0x7, 0x5, 0x1, 0x3, 0x9, 0x80, 0x4, 0x1, 0x0, 0x4000000000000000, 0x2, 0x2, 0xffffffffffffff01, 0x7, 0x8001, 0x2, 0x9, 0x2, 0x7, 0xdb, 0x0, 0x7ff, 0x0, @perf_bp={&(0x7f0000000b80), 0x8}, 0x40, 0x1, 0x1000, 0x7, 0xffffffff00000000, 0xffff, 0x156f}, r6, 0xf, r0, 0x3) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001140)) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:59 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000001500)=ANY=[@ANYBLOB="1800000000000000000000000000000011ca164d7451b0a39f15a63593971c26050000f3f6453ed9b12de100000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r3, 0x50, &(0x7f0000000c80)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b80)=r6, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r8, &(0x7f0000000040)}, 0x20) recvmsg(r7, &(0x7f00000014c0)={&(0x7f0000000d40)=@l2, 0x80, &(0x7f0000001340)=[{&(0x7f0000000dc0)=""/251, 0xfb}, {&(0x7f0000000ec0)=""/54, 0x36}, {&(0x7f0000000f00)=""/154, 0x9a}, {&(0x7f0000001080)=""/140, 0x8c}, {&(0x7f0000001140)=""/13, 0xd}, {&(0x7f0000001180)=""/79, 0x4f}, {&(0x7f0000001200)=""/217, 0xd9}, {&(0x7f0000001300)=""/63, 0x3f}, {&(0x7f0000005000)=""/4096, 0x1000}], 0x9, &(0x7f0000001400)=""/172, 0xac, 0x9}, 0x2000) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000d00)) 2018/03/30 19:08:59 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:59 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:08:59 executing program 1: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d}, 0x2c) 2018/03/30 19:08:59 executing program 5 (fault-call:11 fault-nth:51): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:08:59 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x0, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:08:59 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x0, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1388.647752] FAULT_INJECTION: forcing a failure. [ 1388.647752] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.659214] CPU: 0 PID: 4247 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1388.666405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1388.675755] Call Trace: [ 1388.678334] dump_stack+0x194/0x24d [ 1388.681953] ? arch_local_irq_restore+0x53/0x53 [ 1388.686608] should_fail+0x8c0/0xa40 [ 1388.690304] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 1388.695297] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1388.700380] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1388.705546] ? __lock_acquire+0x664/0x3e00 [ 1388.709755] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1388.714922] ? find_held_lock+0x35/0x1d0 [ 1388.718963] ? __lock_is_held+0xb6/0x140 [ 1388.723006] ? check_same_owner+0x320/0x320 [ 1388.727304] ? __d_lookup+0x4f4/0x830 [ 1388.731113] ? rcu_note_context_switch+0x710/0x710 [ 1388.736027] should_failslab+0xec/0x120 [ 1388.739980] kmem_cache_alloc+0x47/0x760 [ 1388.744028] __d_alloc+0xc1/0xbd0 [ 1388.747475] ? shrink_dcache_for_umount+0x290/0x290 [ 1388.752466] ? d_alloc_parallel+0x1b40/0x1b40 [ 1388.756954] ? lock_release+0xa40/0xa40 [ 1388.760911] ? mark_held_locks+0xaf/0x100 [ 1388.765034] ? d_lookup+0x133/0x2e0 [ 1388.768637] ? d_lookup+0x1d5/0x2e0 [ 1388.772240] d_alloc+0x8e/0x340 [ 1388.775493] ? __d_alloc+0xbd0/0xbd0 [ 1388.779179] ? full_name_hash+0x9b/0xe0 [ 1388.783149] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1388.788401] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1388.792615] rpc_populate.constprop.15+0xa3/0x340 [ 1388.797438] rpc_fill_super+0x379/0xae0 [ 1388.801389] ? cap_capable+0x1b5/0x230 [ 1388.805253] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1388.810417] ? security_capable+0x8e/0xc0 [ 1388.814542] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1388.819707] ? ns_capable_common+0xcf/0x160 [ 1388.824003] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1388.829171] mount_ns+0xc4/0x190 [ 1388.832515] rpc_mount+0x9e/0xd0 [ 1388.835858] mount_fs+0x66/0x2d0 [ 1388.839202] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1388.843770] ? may_umount+0xa0/0xa0 [ 1388.847377] ? _raw_read_unlock+0x22/0x30 [ 1388.851498] ? __get_fs_type+0x8a/0xc0 [ 1388.855359] do_mount+0xea4/0x2bb0 [ 1388.858876] ? copy_mount_string+0x40/0x40 [ 1388.863085] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1388.868075] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1388.872807] ? retint_kernel+0x10/0x10 [ 1388.876686] ? copy_mount_options+0x18b/0x2e0 [ 1388.881153] ? copy_mount_options+0x191/0x2e0 [ 1388.885621] ? copy_mount_options+0x1f7/0x2e0 [ 1388.890091] SyS_mount+0xab/0x120 [ 1388.893515] ? copy_mnt_ns+0xb30/0xb30 [ 1388.897378] do_syscall_64+0x281/0x940 [ 1388.901236] ? vmalloc_sync_all+0x30/0x30 [ 1388.905357] ? _raw_spin_unlock_irq+0x27/0x70 [ 1388.909828] ? finish_task_switch+0x1c1/0x7e0 [ 1388.914299] ? syscall_return_slowpath+0x550/0x550 [ 1388.919204] ? syscall_return_slowpath+0x2ac/0x550 [ 1388.924115] ? prepare_exit_to_usermode+0x350/0x350 [ 1388.929111] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1388.934450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1388.939269] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1388.944433] RIP: 0033:0x454e79 [ 1388.947597] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1388.955280] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1388.962522] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1388.969766] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1388.977010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1388.984255] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000033 [ 1389.029311] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:09:00 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x0, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:00 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=ANY=[@ANYBLOB="18000000000000000001000000000000050000000000000000000000000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:00 executing program 1: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d}, 0x2c) 2018/03/30 19:09:00 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000f40)=""/90, 0x2, 0x932a}, 0x1f) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0xff85}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000f00)) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000ec0)) recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r6}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) sendmsg(r5, &(0x7f0000000e80)={&(0x7f0000000c80)=@ethernet={0x306}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000d00)="34a339433b065b3fbbbbdcbbcc11baf8869bf0ea962a56d350c31179016ff9f4062cf7618317378b6b08c83b88835a91d94015e060669047fd38e9f7f81d1806f0fbfbf1560a040616ea1830e08805bc078b518d38ec0d6c28116ac8e8fb", 0x5e}, {&(0x7f0000000d80)="c67ccb459403340131416138d961814f3882d5c0dc28c7e04d35db13ad6a416ffcfdd6348feca79d2d274380a4ecfc9be3bc8714359fc9f67d6d5be8c1cec2a2952d7f8ea5bb8b5daf128433cd469f10c513403a01e233f39fa8bd22f1ab89f998e7646902b06913", 0x68}, {&(0x7f0000000b80)="bd3d834c", 0x4}, {&(0x7f0000000e00)="3fb4d02384abece8f092119237d2d7642f45b55b87c6605a4865c4fdf2553d024ab550bff595cada6b9c15a7", 0x2c}], 0x4, &(0x7f0000001080)=[{0x20, 0x118, 0x7, "517a3fed73e7da75cf70d12c753fdf91"}, {0x110, 0x115, 0x0, "25bc219a2d3c68ec988f4413db8f63f6d9259d8d3233133047a4297e83d4f5378a47fb3fb06783b8ad38e2c761e28923919f0f76758b21f9a2be9ff54a87b1ef066424f03e340516027d8bdb77f04142681ef91e30551e8380ffa9453f5c33d27d749855b452d9ed90ec288c82fbcc675eff5f9877ba43988c1c0cf3e6d576a18b753746fb6762907e014a9f07b0e4cfe87c2f5a15867828340ebedb431bb019a7660d72f7e3e703dd892bee136c52638ed9202bfabc171f53cc1eca904b274e117e26b25b0fb34ac8f2410c7bc1e4e7c2dba04fb0a66c25a7e7915981b29fe34db2bb44cbb675f72919b51d8f12943cc71692e0d7bd2e2ca55f"}, {0x58, 0x1ff, 0x97, "f82173f5ca8dbcd847c5fe3cd36d715b8b77294295b6e7a59864ed1c0d3f3798f839a84d63ef235cb7a6397ff8ff5151c1259686c367cda56ab53047fdb56ed059eed023a1da"}, {0x100, 0x111, 0xffffffffffffffff, "85d07e1d38a4ec3630a99c5de6be088304d7189c49b2deda299cb28bc3e48809419273f7c859b409649f8da55cc96da411afee60c82ec46144b32479cd5866fc8d07cd2cb0147c7f645c47c8d9610e6f3f2a7c9e86d9848fd5524519c2168af46c5d0f6928971dc5c8c828e45a9ff8b91a657407af63471defa8d87d0f3389c104af11ee637668972bad5fb8f059742e316a46c5df1d4e95ef386b5e33191bc53f1728f9f9a6c9c7fbf443c1ec6929abfba77bf4d40ec113b088e1ee2b5661871e5c50b9ab25158239a10d6400d160c7998ec1df9355ac7c7072cf8931b53277d5b39f30058d8d676d082079"}], 0x288, 0x10}, 0x4000011) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r7, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:00 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x0, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:00 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:00 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:00 executing program 5 (fault-call:11 fault-nth:52): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) [ 1389.234251] FAULT_INJECTION: forcing a failure. [ 1389.234251] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.245583] CPU: 1 PID: 4285 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1389.252771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.262211] Call Trace: [ 1389.264803] dump_stack+0x194/0x24d [ 1389.268439] ? arch_local_irq_restore+0x53/0x53 [ 1389.273093] should_fail+0x8c0/0xa40 [ 1389.277220] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1389.282297] ? __lock_is_held+0xb6/0x140 [ 1389.286335] ? mark_held_locks+0xaf/0x100 [ 1389.290462] ? __raw_spin_lock_init+0x1c/0x100 [ 1389.295025] ? find_held_lock+0x35/0x1d0 [ 1389.299065] ? __lock_is_held+0xb6/0x140 [ 1389.303104] ? check_same_owner+0x320/0x320 [ 1389.307403] ? d_alloc+0x269/0x340 [ 1389.310924] ? rcu_note_context_switch+0x710/0x710 [ 1389.315825] ? lock_release+0xa40/0xa40 [ 1389.319775] should_failslab+0xec/0x120 [ 1389.323728] kmem_cache_alloc+0x47/0x760 [ 1389.327762] ? d_drop+0x51/0x60 [ 1389.331022] ? rpc_i_callback+0x30/0x30 [ 1389.334973] rpc_alloc_inode+0x1a/0x20 [ 1389.338835] alloc_inode+0x65/0x180 [ 1389.342436] new_inode_pseudo+0x69/0x190 [ 1389.346468] ? prune_icache_sb+0x1a0/0x1a0 [ 1389.350677] ? do_raw_spin_trylock+0x190/0x190 [ 1389.355238] ? d_add+0xa70/0xa70 [ 1389.358583] new_inode+0x1c/0x40 [ 1389.361932] rpc_get_inode+0x20/0x1e0 [ 1389.365708] __rpc_create_common+0x5d/0x1d0 [ 1389.370104] rpc_populate.constprop.15+0x1ad/0x340 [ 1389.375019] rpc_fill_super+0x379/0xae0 [ 1389.378973] ? cap_capable+0x1b5/0x230 [ 1389.382860] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1389.388029] ? security_capable+0x8e/0xc0 [ 1389.392154] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1389.397316] ? ns_capable_common+0xcf/0x160 [ 1389.401613] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1389.406776] mount_ns+0xc4/0x190 [ 1389.410118] rpc_mount+0x9e/0xd0 [ 1389.413461] mount_fs+0x66/0x2d0 [ 1389.416803] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1389.421358] ? may_umount+0xa0/0xa0 [ 1389.424960] ? _raw_read_unlock+0x22/0x30 [ 1389.429081] ? __get_fs_type+0x8a/0xc0 [ 1389.432943] do_mount+0xea4/0x2bb0 [ 1389.436462] ? copy_mount_string+0x40/0x40 [ 1389.440672] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1389.445665] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1389.450396] ? retint_kernel+0x10/0x10 [ 1389.454265] ? copy_mount_options+0x149/0x2e0 [ 1389.458737] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1389.463552] ? copy_mount_options+0x1f7/0x2e0 [ 1389.468026] SyS_mount+0xab/0x120 [ 1389.471454] ? copy_mnt_ns+0xb30/0xb30 [ 1389.475318] do_syscall_64+0x281/0x940 [ 1389.479179] ? vmalloc_sync_all+0x30/0x30 [ 1389.483298] ? _raw_spin_unlock_irq+0x27/0x70 [ 1389.487769] ? finish_task_switch+0x1c1/0x7e0 [ 1389.492237] ? syscall_return_slowpath+0x550/0x550 [ 1389.497140] ? syscall_return_slowpath+0x2ac/0x550 [ 1389.502044] ? prepare_exit_to_usermode+0x350/0x350 [ 1389.507034] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1389.512373] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1389.517282] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1389.522443] RIP: 0033:0x454e79 [ 1389.525609] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 19:09:00 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800)}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1389.533299] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1389.540541] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1389.547785] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1389.555040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1389.562283] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000034 [ 1389.569691] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfsd 2018/03/30 19:09:00 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x0, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:00 executing program 1: mkdir(&(0x7f0000003140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x80006, 0x100000001, &(0x7f0000002d00)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002e40)={r1, &(0x7f0000002d40)="066694760bfcd9568fd4a96c2cc9b43c8f57fdcf6aaaf4ec8edbb4", &(0x7f0000002d80)="baeb1f7b930eec06d403d0b01fdf137d095cefed9cac05c37adb6c454ca8826b659c2c11801f0899ea30c0067c209d8baf13ed5e90a03fa74b1547a118b54111f889c006f64d10dc8e873eeff18226c02ffc66dcd0b2986c4f44862888baff93d3452fb50351e03722febdb355796ec26faf84177e7f64495f0dee3e562ba2d348b0f089928adeebb835411834a1331522b9cda00cbb2c71ffd15f058fb99e9193fde7ce9536ee48e7eeaa5a3dbdc6f52662ec94ea7a14eb6a", 0x1}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002c40)={&(0x7f0000002c00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='binfmt_misc\x00', 0x2, &(0x7f0000000440)="a20e263763ee05e5dc26c35e2792375a5eea08875d2660c1168382cde5e338ac676bbbe71db5d864992d49fa98ba3ef65e620575ca7f49a0dede94e3c24226c80469e46cd43eb88b03a6bede2fab80e3b2b3851c8e767424178c83b4dc724a886da2c0dab97d632b15f62e8f8e65da382b61b640ad15e9cf9b5ca85b44185963b7f400a1d87df51a2a11d8b648e012c339437e8f887d28b46adec49c7f69dd35d380cedf0ea49ae2474215a993b6d6d95641e2ee67c44447aba1fe43f598dd9c439f4a64f3110f1ad439147c09") socketpair(0x15, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)='sysv\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="0ae27bc735b9adc220c720fdf2f2e4941031f259fd386b84f832f0b4be9698f2908a53eef43aba5b20264d198c106a52e0b511a8f1eafd6ea6803d6623", &(0x7f0000000180)=""/234}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000380), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={r3, &(0x7f0000002ac0)="5b0213167ba87bb0e43160a2e0a0216e8436b9a16da43c300fb945606552efb6be4a1b182c12b37e9b92ee5057f0079c9372558d81b8b2bc4a2489402e1aad8f19f78238cf2a49f0e7138808408d1501d3dbb78ee67aa906db040e0636259c365ce9bbd0e3fd0c64", &(0x7f0000002b40)="f8dc9253e95b4841d7a785be0b09040a2be0ee5a60063bd240"}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002bc0)=0x80000000, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002cc0)={&(0x7f0000002c80)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(r3, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/217, 0xd9}, {&(0x7f0000001640)=""/51, 0x33}, {&(0x7f0000001680)=""/246, 0xf6}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x6, &(0x7f0000002880)=""/232, 0xe8, 0x7}, 0x10040) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000003040)=ANY=[@ANYBLOB="18000000000000100000000000000e0f35e77a6212db00000000000000007300950013569fb9e6c8e4bb659791827ec800000000200090c4a26a08ea00e978ca40771341b0e65e50d6a609ac26a65d0a05f5bc34ded7b109174030ee9ef9a749ea68dbb420fb63cddfe876c6c135cf52f1b88e58fa0f"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r4, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f00000030c0)='./file0/bus\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) 2018/03/30 19:09:00 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:00 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:00 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000001580)="9e86ca65ca6d81cbf9ecec891f379e70215b1ba18d0a5a3effebfe322073345dc04fb75dda270f6c1654d1e2fd7e80103e68d38670c64808ec9f882e1a841ab8", &(0x7f00000014c0)="e7c4124a6f004884fbe499a66b1744249cc019d92bc040131fef39d88be6585e4e40ffffffffffffd023b79a3dbe7fdbab3027df78477bebdf234b354b497a6e954b21605b48dced7a607fd745ddb800451e707ce7a252af358a44cd90836b6058c71a11ebcc31b98d84bda85afb1a13fcefb5a4b22aac22d67f7ff553365c78dfc3bf4fe751b67620f511dd0000000000000000", 0x2000000}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000d40)="5dcc4dcd88570a36ac45f20c9bc237853fa29a1ffe131d4d4eefcbd1bdb01cfdf1f276dfdede82bca00b59d58c73b54d2953e6954abd42e98b7feb6a997da9cac91842d0bf0ef21c1bfa8ffb525c"}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) sendmsg(r1, &(0x7f0000001440)={&(0x7f0000000dc0)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @broadcast=0xffffffff}, 0x4, 0x1, 0x1, 0x2}}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000e40)="7966f357f0dd823cd1527792a90888f7cd606b0ef4cc3afa0ec90ae851e637f03ad174657b83ae874363fa389c2e551f203924080d68011cbf74bc927ec55f5e0f1c2a82e21c2845ea30f84233722e944e637d078ac40c6870d1113b5a15447e9880c0ac6ec2d8d065143e6da0f9b20bd08d40bbd5877458ef17b607cf9d2c5e27", 0x81}, {&(0x7f0000001080)="54637dc30a65ff99500013689bdfb733bfcb6f51333e3025004fa010604e0549b56cfa0fae3cf0b7fa53dd09207f934e9266ca9dfebb77044a7f15514bacb249452d0e15d367257441d109aabb5df32e22b43231eff4d6090a08fcc25cd1497439c0fc1af6bd73903d32da41b6c885ec8f593d4e3031ad55698be5d7a15aa55fb156250179991db7ab727f1390eed157e4c4e6a0bff0897aecd2ef607ea60e4a51ffd821e175b7830aca892a21c0fb77b98c1e7d6c93cbb52eb695aaa346100fb5b26f0a6dc561ea82bd024a3d1069a60b8c3ee7bc47a408b38709bd7c671854abae4cc1514538036a9f3f9b5385ee590ad3d3526863ac5bd27c3aa4b3", 0xfd}, {&(0x7f0000000f00)="12bc12f3f299ad078f76e0ee22efbccfdda38b8c7ff25026", 0x18}, {&(0x7f0000000f40)="e8ae5aa1af0f1934cbcfc7589eae8e405c140f1cd8b6f0d9af1764940858c88c62f7a86b8a40fe536385c280f24fd4d1984d9ea856e25f8e3739aad80bed6416dcf007bed9ab421dee86f0e10bf2c7fb80e7daa0df8ee9809396888dab0b9ce424c8", 0x62}], 0x4, &(0x7f00000011c0)=[{0xc0, 0x103, 0x9, "5ba5e59377c1594052775e81605e7e3cd92a42f113d61c5ca01f364b6ce737940a7dd2ab31f1bf353830ecc6a33dce636502412839fb82b182a23a8ace6fa12affb012b23fa24b631750f3ca6037518e1784c4a303c096e80e7bb90fbe36b1bc10008bdcd2264878e946cf1a4f205550d62fd625f954d58e825b96cc5de4f701d259c5ec62202025140fb10e69990e3c404d310be752bfbfb3d1692348683cd41743a8052d17a3f8d7373829"}, {0x98, 0x117, 0x3, "e7caa846c56886140379f8cafcd3dad7deb297a957a36fc4abc5b45337c20bfb440fd7a43d6529448ce7750c6a0e8d40b92e1230f2179c914728a62943567ba245c57d6305efc22de8a4914744773618c29143de46f683fda65198dcbcee685526de83f5a13087e69588361f368a4f8d8f140d5477f03357664f1b1f6bb1bb4f2eee5f57e070a9"}, {0x110, 0x112, 0x7, "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"}], 0x268, 0x10}, 0x810) recvmsg(r0, &(0x7f0000000d00)={&(0x7f0000000440)=@sco, 0x80, &(0x7f0000000b80)=[{&(0x7f00000004c0)=""/3, 0x3}, {&(0x7f0000000880)=""/6, 0x6}], 0x2, &(0x7f0000000c80)=""/94, 0x5e, 0x7}, 0x40000000) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:00 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800)}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1389.664069] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:09:00 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000b80)='./file0/bus\x00', &(0x7f0000000c80)='logfs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:01 executing program 5 (fault-call:11 fault-nth:53): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:09:01 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0x0, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:01 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 1389.967101] FAULT_INJECTION: forcing a failure. [ 1389.967101] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.978530] CPU: 0 PID: 4344 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1389.986238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.995586] Call Trace: [ 1389.998163] dump_stack+0x194/0x24d [ 1390.001771] ? arch_local_irq_restore+0x53/0x53 [ 1390.006435] ? finish_task_switch+0x1c1/0x7e0 [ 1390.011797] ? finish_task_switch+0x182/0x7e0 [ 1390.016275] should_fail+0x8c0/0xa40 [ 1390.019965] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1390.025047] ? __lock_acquire+0x664/0x3e00 [ 1390.029261] ? __sched_text_start+0x8/0x8 [ 1390.033382] ? find_held_lock+0x35/0x1d0 [ 1390.037420] ? __lock_is_held+0xb6/0x140 [ 1390.041461] ? check_same_owner+0x320/0x320 [ 1390.045757] ? __d_lookup+0x4f4/0x830 [ 1390.049532] ? lockdep_init_map+0x9/0x10 [ 1390.053570] should_failslab+0xec/0x120 [ 1390.057519] kmem_cache_alloc+0x47/0x760 [ 1390.061557] __d_alloc+0xc1/0xbd0 [ 1390.064988] ? shrink_dcache_for_umount+0x290/0x290 [ 1390.069999] ? d_alloc_parallel+0x1b40/0x1b40 [ 1390.074476] ? lock_release+0xa40/0xa40 [ 1390.078427] ? mark_held_locks+0xaf/0x100 [ 1390.082547] ? d_lookup+0x133/0x2e0 [ 1390.086149] ? d_lookup+0x1d5/0x2e0 [ 1390.089750] d_alloc+0x8e/0x340 [ 1390.093003] ? __d_alloc+0xbd0/0xbd0 [ 1390.096695] ? full_name_hash+0x9b/0xe0 [ 1390.100652] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1390.105900] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1390.110112] rpc_populate.constprop.15+0xa3/0x340 [ 1390.114934] rpc_fill_super+0x379/0xae0 [ 1390.118887] ? cap_capable+0x1b5/0x230 [ 1390.122748] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1390.127910] ? security_capable+0x8e/0xc0 [ 1390.132036] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1390.137203] ? ns_capable_common+0xcf/0x160 [ 1390.141499] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1390.146662] mount_ns+0xc4/0x190 [ 1390.150003] rpc_mount+0x9e/0xd0 [ 1390.153355] mount_fs+0x66/0x2d0 [ 1390.156695] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1390.161877] ? may_umount+0xa0/0xa0 [ 1390.165477] ? _raw_read_unlock+0x22/0x30 [ 1390.169597] ? __get_fs_type+0x8a/0xc0 [ 1390.173461] do_mount+0xea4/0x2bb0 [ 1390.176977] ? copy_mount_string+0x40/0x40 [ 1390.181185] ? rcu_pm_notify+0xc0/0xc0 [ 1390.185048] ? copy_mount_options+0x5f/0x2e0 [ 1390.189427] ? rcu_read_lock_sched_held+0x108/0x120 [ 1390.194416] ? kmem_cache_alloc_trace+0x459/0x740 [ 1390.199231] ? kasan_check_write+0x14/0x20 [ 1390.203441] ? _copy_from_user+0x99/0x110 [ 1390.207563] ? copy_mount_options+0x1f7/0x2e0 [ 1390.212046] SyS_mount+0xab/0x120 [ 1390.215472] ? copy_mnt_ns+0xb30/0xb30 [ 1390.219334] do_syscall_64+0x281/0x940 [ 1390.223197] ? vmalloc_sync_all+0x30/0x30 [ 1390.227318] ? _raw_spin_unlock_irq+0x27/0x70 [ 1390.231792] ? finish_task_switch+0x1c1/0x7e0 [ 1390.236259] ? syscall_return_slowpath+0x550/0x550 [ 1390.241162] ? syscall_return_slowpath+0x2ac/0x550 [ 1390.246065] ? prepare_exit_to_usermode+0x350/0x350 [ 1390.251057] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1390.256394] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1390.261213] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1390.266373] RIP: 0033:0x454e79 [ 1390.269539] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1390.277221] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1390.284463] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1390.292312] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1390.299557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1390.306798] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000035 [ 1390.315672] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:09:01 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0x0, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:01 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800)}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:01 executing program 1: mkdir(&(0x7f0000003140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x80006, 0x100000001, &(0x7f0000002d00)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002e40)={r1, &(0x7f0000002d40)="066694760bfcd9568fd4a96c2cc9b43c8f57fdcf6aaaf4ec8edbb4", &(0x7f0000002d80)="baeb1f7b930eec06d403d0b01fdf137d095cefed9cac05c37adb6c454ca8826b659c2c11801f0899ea30c0067c209d8baf13ed5e90a03fa74b1547a118b54111f889c006f64d10dc8e873eeff18226c02ffc66dcd0b2986c4f44862888baff93d3452fb50351e03722febdb355796ec26faf84177e7f64495f0dee3e562ba2d348b0f089928adeebb835411834a1331522b9cda00cbb2c71ffd15f058fb99e9193fde7ce9536ee48e7eeaa5a3dbdc6f52662ec94ea7a14eb6a", 0x1}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002c40)={&(0x7f0000002c00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='binfmt_misc\x00', 0x2, &(0x7f0000000440)="a20e263763ee05e5dc26c35e2792375a5eea08875d2660c1168382cde5e338ac676bbbe71db5d864992d49fa98ba3ef65e620575ca7f49a0dede94e3c24226c80469e46cd43eb88b03a6bede2fab80e3b2b3851c8e767424178c83b4dc724a886da2c0dab97d632b15f62e8f8e65da382b61b640ad15e9cf9b5ca85b44185963b7f400a1d87df51a2a11d8b648e012c339437e8f887d28b46adec49c7f69dd35d380cedf0ea49ae2474215a993b6d6d95641e2ee67c44447aba1fe43f598dd9c439f4a64f3110f1ad439147c09") socketpair(0x15, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)='sysv\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="0ae27bc735b9adc220c720fdf2f2e4941031f259fd386b84f832f0b4be9698f2908a53eef43aba5b20264d198c106a52e0b511a8f1eafd6ea6803d6623", &(0x7f0000000180)=""/234}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000380), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={r3, &(0x7f0000002ac0)="5b0213167ba87bb0e43160a2e0a0216e8436b9a16da43c300fb945606552efb6be4a1b182c12b37e9b92ee5057f0079c9372558d81b8b2bc4a2489402e1aad8f19f78238cf2a49f0e7138808408d1501d3dbb78ee67aa906db040e0636259c365ce9bbd0e3fd0c64", &(0x7f0000002b40)="f8dc9253e95b4841d7a785be0b09040a2be0ee5a60063bd240"}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002bc0)=0x80000000, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002cc0)={&(0x7f0000002c80)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(r3, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/217, 0xd9}, {&(0x7f0000001640)=""/51, 0x33}, {&(0x7f0000001680)=""/246, 0xf6}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x6, &(0x7f0000002880)=""/232, 0xe8, 0x7}, 0x10040) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000003040)=ANY=[@ANYBLOB="18000000000000100000000000000e0f35e77a6212db00000000000000007300950013569fb9e6c8e4bb659791827ec800000000200090c4a26a08ea00e978ca40771341b0e65e50d6a609ac26a65d0a05f5bc34ded7b109174030ee9ef9a749ea68dbb420fb63cddfe876c6c135cf52f1b88e58fa0f"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r4, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f00000030c0)='./file0/bus\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) 2018/03/30 19:09:01 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:01 executing program 4: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x28, &(0x7f0000000f40)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001080)={r0, 0x80000001, 0x8}, 0xc) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x9) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f00000010c0)=ANY=[@ANYBLOB="180004000000000000612d0200000000050000000000a42c4611f04826e7c6b34b6a000000000000000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r5, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r4, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000100)=r5, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e40)={r3, 0x50, &(0x7f0000000dc0)}, 0x10) recvmsg(r6, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg(r1, &(0x7f0000000b80)={&(0x7f0000000c80)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000005000)=""/4096, 0x1000}], 0x1, &(0x7f0000000d00)=""/148, 0x94, 0x5}, 0x40002000) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r7}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001100)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000ec0)={r2, 0x28, &(0x7f0000000e80)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000f00)={r8, 0x5, 0x18}, 0xc) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r9, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:01 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:01 executing program 5 (fault-call:11 fault-nth:54): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:09:01 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000002e59f6cbabb93b626cab8235f20000000000000000220005000000000000000000000000000000950000000000e675"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) [ 1390.483997] FAULT_INJECTION: forcing a failure. [ 1390.483997] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.495286] CPU: 1 PID: 4393 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1390.502472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1390.511907] Call Trace: [ 1390.514495] dump_stack+0x194/0x24d [ 1390.518125] ? arch_local_irq_restore+0x53/0x53 [ 1390.522807] should_fail+0x8c0/0xa40 [ 1390.526527] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/03/30 19:09:01 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0x0, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:01 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:01 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b80)={&(0x7f00000000c0)='./file0/bus\x00', 0x0, 0x10}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:01 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:01 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000), 0x1000000000000057, &(0x7f0000000180)=""/105, 0x69, 0x9}, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) [ 1390.531645] ? __lock_is_held+0xb6/0x140 [ 1390.535713] ? mark_held_locks+0xaf/0x100 [ 1390.539865] ? __raw_spin_lock_init+0x1c/0x100 [ 1390.544452] ? find_held_lock+0x35/0x1d0 [ 1390.548508] ? __lock_is_held+0xb6/0x140 [ 1390.552569] ? check_same_owner+0x320/0x320 [ 1390.556888] ? d_alloc+0x269/0x340 [ 1390.560427] ? rcu_note_context_switch+0x710/0x710 [ 1390.565356] ? lock_release+0xa40/0xa40 [ 1390.569335] should_failslab+0xec/0x120 [ 1390.573319] kmem_cache_alloc+0x47/0x760 [ 1390.577381] ? d_drop+0x51/0x60 [ 1390.580659] ? rpc_i_callback+0x30/0x30 2018/03/30 19:09:01 executing program 1: mkdir(&(0x7f0000003140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x80006, 0x100000001, &(0x7f0000002d00)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002e40)={r1, &(0x7f0000002d40)="066694760bfcd9568fd4a96c2cc9b43c8f57fdcf6aaaf4ec8edbb4", &(0x7f0000002d80)="baeb1f7b930eec06d403d0b01fdf137d095cefed9cac05c37adb6c454ca8826b659c2c11801f0899ea30c0067c209d8baf13ed5e90a03fa74b1547a118b54111f889c006f64d10dc8e873eeff18226c02ffc66dcd0b2986c4f44862888baff93d3452fb50351e03722febdb355796ec26faf84177e7f64495f0dee3e562ba2d348b0f089928adeebb835411834a1331522b9cda00cbb2c71ffd15f058fb99e9193fde7ce9536ee48e7eeaa5a3dbdc6f52662ec94ea7a14eb6a", 0x1}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002c40)={&(0x7f0000002c00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='binfmt_misc\x00', 0x2, &(0x7f0000000440)="a20e263763ee05e5dc26c35e2792375a5eea08875d2660c1168382cde5e338ac676bbbe71db5d864992d49fa98ba3ef65e620575ca7f49a0dede94e3c24226c80469e46cd43eb88b03a6bede2fab80e3b2b3851c8e767424178c83b4dc724a886da2c0dab97d632b15f62e8f8e65da382b61b640ad15e9cf9b5ca85b44185963b7f400a1d87df51a2a11d8b648e012c339437e8f887d28b46adec49c7f69dd35d380cedf0ea49ae2474215a993b6d6d95641e2ee67c44447aba1fe43f598dd9c439f4a64f3110f1ad439147c09") socketpair(0x15, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)='sysv\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="0ae27bc735b9adc220c720fdf2f2e4941031f259fd386b84f832f0b4be9698f2908a53eef43aba5b20264d198c106a52e0b511a8f1eafd6ea6803d6623", &(0x7f0000000180)=""/234}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000380), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={r3, &(0x7f0000002ac0)="5b0213167ba87bb0e43160a2e0a0216e8436b9a16da43c300fb945606552efb6be4a1b182c12b37e9b92ee5057f0079c9372558d81b8b2bc4a2489402e1aad8f19f78238cf2a49f0e7138808408d1501d3dbb78ee67aa906db040e0636259c365ce9bbd0e3fd0c64", &(0x7f0000002b40)="f8dc9253e95b4841d7a785be0b09040a2be0ee5a60063bd240"}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002bc0)=0x80000000, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002cc0)={&(0x7f0000002c80)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(r3, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/217, 0xd9}, {&(0x7f0000001640)=""/51, 0x33}, {&(0x7f0000001680)=""/246, 0xf6}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x6, &(0x7f0000002880)=""/232, 0xe8, 0x7}, 0x10040) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000003040)=ANY=[@ANYBLOB="18000000000000100000000000000e0f35e77a6212db00000000000000007300950013569fb9e6c8e4bb659791827ec800000000200090c4a26a08ea00e978ca40771341b0e65e50d6a609ac26a65d0a05f5bc34ded7b109174030ee9ef9a749ea68dbb420fb63cddfe876c6c135cf52f1b88e58fa0f"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r4, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f00000030c0)='./file0/bus\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) 2018/03/30 19:09:01 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) [ 1390.584629] rpc_alloc_inode+0x1a/0x20 [ 1390.588514] alloc_inode+0x65/0x180 [ 1390.592135] new_inode_pseudo+0x69/0x190 [ 1390.596197] ? prune_icache_sb+0x1a0/0x1a0 [ 1390.600438] ? do_raw_spin_trylock+0x190/0x190 [ 1390.605015] ? d_add+0xa70/0xa70 [ 1390.608383] new_inode+0x1c/0x40 [ 1390.611737] rpc_get_inode+0x20/0x1e0 [ 1390.615523] __rpc_create_common+0x5d/0x1d0 [ 1390.619821] rpc_populate.constprop.15+0x1ad/0x340 [ 1390.624729] rpc_fill_super+0x379/0xae0 [ 1390.628680] ? cap_capable+0x1b5/0x230 [ 1390.632541] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1390.637705] ? security_capable+0x8e/0xc0 [ 1390.641829] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1390.646992] ? ns_capable_common+0xcf/0x160 [ 1390.651293] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1390.656459] mount_ns+0xc4/0x190 [ 1390.659800] rpc_mount+0x9e/0xd0 [ 1390.663143] mount_fs+0x66/0x2d0 [ 1390.666483] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1390.671045] ? may_umount+0xa0/0xa0 [ 1390.674659] ? _raw_read_unlock+0x22/0x30 [ 1390.678785] ? __get_fs_type+0x8a/0xc0 [ 1390.682645] do_mount+0xea4/0x2bb0 [ 1390.686159] ? copy_mount_string+0x40/0x40 [ 1390.690365] ? rcu_pm_notify+0xc0/0xc0 [ 1390.694237] ? copy_mount_options+0x5f/0x2e0 [ 1390.698619] ? rcu_read_lock_sched_held+0x108/0x120 [ 1390.703616] ? kmem_cache_alloc_trace+0x459/0x740 [ 1390.708433] ? kasan_check_write+0x14/0x20 [ 1390.712647] ? _copy_from_user+0x99/0x110 [ 1390.716773] ? copy_mount_options+0x1f7/0x2e0 [ 1390.721241] SyS_mount+0xab/0x120 [ 1390.724669] ? copy_mnt_ns+0xb30/0xb30 [ 1390.728530] do_syscall_64+0x281/0x940 [ 1390.732391] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 1390.737907] ? syscall_return_slowpath+0x550/0x550 [ 1390.742811] ? syscall_return_slowpath+0x2ac/0x550 [ 1390.747716] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1390.753056] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1390.757877] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1390.763055] RIP: 0033:0x454e79 [ 1390.766228] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1390.773913] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1390.781155] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1390.788403] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1390.795647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1390.802891] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000036 [ 1390.810338] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry gssd [ 1390.819402] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:09:02 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:02 executing program 5 (fault-call:11 fault-nth:55): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:09:02 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:02 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:02 executing program 1: mkdir(&(0x7f0000003140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x80006, 0x100000001, &(0x7f0000002d00)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002e40)={r1, &(0x7f0000002d40)="066694760bfcd9568fd4a96c2cc9b43c8f57fdcf6aaaf4ec8edbb4", &(0x7f0000002d80)="baeb1f7b930eec06d403d0b01fdf137d095cefed9cac05c37adb6c454ca8826b659c2c11801f0899ea30c0067c209d8baf13ed5e90a03fa74b1547a118b54111f889c006f64d10dc8e873eeff18226c02ffc66dcd0b2986c4f44862888baff93d3452fb50351e03722febdb355796ec26faf84177e7f64495f0dee3e562ba2d348b0f089928adeebb835411834a1331522b9cda00cbb2c71ffd15f058fb99e9193fde7ce9536ee48e7eeaa5a3dbdc6f52662ec94ea7a14eb6a", 0x1}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002c40)={&(0x7f0000002c00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='binfmt_misc\x00', 0x2, &(0x7f0000000440)="a20e263763ee05e5dc26c35e2792375a5eea08875d2660c1168382cde5e338ac676bbbe71db5d864992d49fa98ba3ef65e620575ca7f49a0dede94e3c24226c80469e46cd43eb88b03a6bede2fab80e3b2b3851c8e767424178c83b4dc724a886da2c0dab97d632b15f62e8f8e65da382b61b640ad15e9cf9b5ca85b44185963b7f400a1d87df51a2a11d8b648e012c339437e8f887d28b46adec49c7f69dd35d380cedf0ea49ae2474215a993b6d6d95641e2ee67c44447aba1fe43f598dd9c439f4a64f3110f1ad439147c09") socketpair(0x15, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)='sysv\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="0ae27bc735b9adc220c720fdf2f2e4941031f259fd386b84f832f0b4be9698f2908a53eef43aba5b20264d198c106a52e0b511a8f1eafd6ea6803d6623", &(0x7f0000000180)=""/234}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000380), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={r3, &(0x7f0000002ac0)="5b0213167ba87bb0e43160a2e0a0216e8436b9a16da43c300fb945606552efb6be4a1b182c12b37e9b92ee5057f0079c9372558d81b8b2bc4a2489402e1aad8f19f78238cf2a49f0e7138808408d1501d3dbb78ee67aa906db040e0636259c365ce9bbd0e3fd0c64", &(0x7f0000002b40)="f8dc9253e95b4841d7a785be0b09040a2be0ee5a60063bd240"}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002bc0)=0x80000000, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002cc0)={&(0x7f0000002c80)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(r3, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/217, 0xd9}, {&(0x7f0000001640)=""/51, 0x33}, {&(0x7f0000001680)=""/246, 0xf6}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x6, &(0x7f0000002880)=""/232, 0xe8, 0x7}, 0x10040) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000003040)=ANY=[@ANYBLOB="18000000000000100000000000000e0f35e77a6212db00000000000000007300950013569fb9e6c8e4bb659791827ec800000000200090c4a26a08ea00e978ca40771341b0e65e50d6a609ac26a65d0a05f5bc34ded7b109174030ee9ef9a749ea68dbb420fb63cddfe876c6c135cf52f1b88e58fa0f"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r4, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) [ 1391.064896] FAULT_INJECTION: forcing a failure. [ 1391.064896] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.076179] CPU: 1 PID: 4458 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1391.083366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.092716] Call Trace: [ 1391.095299] dump_stack+0x194/0x24d [ 1391.098928] ? arch_local_irq_restore+0x53/0x53 [ 1391.103611] should_fail+0x8c0/0xa40 [ 1391.107328] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1391.112439] ? __lock_is_held+0xb6/0x140 [ 1391.116482] ? mark_held_locks+0xaf/0x100 [ 1391.120610] ? __raw_spin_lock_init+0x1c/0x100 [ 1391.125168] ? find_held_lock+0x35/0x1d0 [ 1391.129207] ? __lock_is_held+0xb6/0x140 [ 1391.133247] ? check_same_owner+0x320/0x320 [ 1391.137549] ? d_alloc+0x269/0x340 [ 1391.141066] ? rcu_note_context_switch+0x710/0x710 [ 1391.145970] ? lock_release+0xa40/0xa40 [ 1391.149932] should_failslab+0xec/0x120 [ 1391.153886] kmem_cache_alloc+0x47/0x760 [ 1391.157926] ? d_drop+0x51/0x60 [ 1391.161182] ? rpc_i_callback+0x30/0x30 [ 1391.165131] rpc_alloc_inode+0x1a/0x20 [ 1391.168994] alloc_inode+0x65/0x180 [ 1391.172597] new_inode_pseudo+0x69/0x190 [ 1391.176629] ? prune_icache_sb+0x1a0/0x1a0 [ 1391.180842] ? do_raw_spin_trylock+0x190/0x190 [ 1391.185396] ? d_add+0xa70/0xa70 [ 1391.188744] new_inode+0x1c/0x40 [ 1391.192085] rpc_get_inode+0x20/0x1e0 [ 1391.195860] __rpc_create_common+0x5d/0x1d0 [ 1391.200246] rpc_populate.constprop.15+0x1ad/0x340 [ 1391.205160] rpc_fill_super+0x379/0xae0 [ 1391.209110] ? cap_capable+0x1b5/0x230 [ 1391.213058] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1391.218223] ? security_capable+0x8e/0xc0 [ 1391.222348] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1391.227515] ? ns_capable_common+0xcf/0x160 [ 1391.231814] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1391.236979] mount_ns+0xc4/0x190 [ 1391.240321] rpc_mount+0x9e/0xd0 [ 1391.243661] mount_fs+0x66/0x2d0 [ 1391.247001] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1391.251560] ? may_umount+0xa0/0xa0 [ 1391.255160] ? _raw_read_unlock+0x22/0x30 [ 1391.259281] ? __get_fs_type+0x8a/0xc0 [ 1391.263145] do_mount+0xea4/0x2bb0 [ 1391.266662] ? copy_mount_string+0x40/0x40 [ 1391.270956] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1391.275946] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1391.280676] ? retint_kernel+0x10/0x10 [ 1391.284538] ? copy_mount_options+0x18b/0x2e0 [ 1391.289010] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 1391.293829] ? copy_mount_options+0x1f7/0x2e0 [ 1391.298298] SyS_mount+0xab/0x120 [ 1391.301726] ? copy_mnt_ns+0xb30/0xb30 [ 1391.305599] do_syscall_64+0x281/0x940 [ 1391.309462] ? vmalloc_sync_all+0x30/0x30 [ 1391.313583] ? _raw_spin_unlock_irq+0x27/0x70 [ 1391.318053] ? finish_task_switch+0x1c1/0x7e0 [ 1391.322521] ? syscall_return_slowpath+0x550/0x550 [ 1391.327427] ? syscall_return_slowpath+0x2ac/0x550 [ 1391.332332] ? prepare_exit_to_usermode+0x350/0x350 [ 1391.337322] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1391.342663] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1391.347480] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1391.352643] RIP: 0033:0x454e79 [ 1391.355807] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 19:09:02 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b80)={r6, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000c80)={r7, 0xfd, 0x18}, 0xc) [ 1391.363488] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1391.370731] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1391.377974] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1391.385217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1391.392461] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000037 [ 1391.399833] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry gssd [ 1391.427480] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 19:09:02 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x0, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:02 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000440)={0x2, 0x0, [0x0, 0x0]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r1, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r3}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:02 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:02 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:02 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:02 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:02 executing program 5 (fault-call:11 fault-nth:56): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:09:02 executing program 1: mkdir(&(0x7f0000003140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x80006, 0x100000001, &(0x7f0000002d00)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002e40)={r1, &(0x7f0000002d40)="066694760bfcd9568fd4a96c2cc9b43c8f57fdcf6aaaf4ec8edbb4", &(0x7f0000002d80)="baeb1f7b930eec06d403d0b01fdf137d095cefed9cac05c37adb6c454ca8826b659c2c11801f0899ea30c0067c209d8baf13ed5e90a03fa74b1547a118b54111f889c006f64d10dc8e873eeff18226c02ffc66dcd0b2986c4f44862888baff93d3452fb50351e03722febdb355796ec26faf84177e7f64495f0dee3e562ba2d348b0f089928adeebb835411834a1331522b9cda00cbb2c71ffd15f058fb99e9193fde7ce9536ee48e7eeaa5a3dbdc6f52662ec94ea7a14eb6a", 0x1}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002c40)={&(0x7f0000002c00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='binfmt_misc\x00', 0x2, &(0x7f0000000440)="a20e263763ee05e5dc26c35e2792375a5eea08875d2660c1168382cde5e338ac676bbbe71db5d864992d49fa98ba3ef65e620575ca7f49a0dede94e3c24226c80469e46cd43eb88b03a6bede2fab80e3b2b3851c8e767424178c83b4dc724a886da2c0dab97d632b15f62e8f8e65da382b61b640ad15e9cf9b5ca85b44185963b7f400a1d87df51a2a11d8b648e012c339437e8f887d28b46adec49c7f69dd35d380cedf0ea49ae2474215a993b6d6d95641e2ee67c44447aba1fe43f598dd9c439f4a64f3110f1ad439147c09") socketpair(0x15, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)='sysv\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="0ae27bc735b9adc220c720fdf2f2e4941031f259fd386b84f832f0b4be9698f2908a53eef43aba5b20264d198c106a52e0b511a8f1eafd6ea6803d6623", &(0x7f0000000180)=""/234}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000380), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={r3, &(0x7f0000002ac0)="5b0213167ba87bb0e43160a2e0a0216e8436b9a16da43c300fb945606552efb6be4a1b182c12b37e9b92ee5057f0079c9372558d81b8b2bc4a2489402e1aad8f19f78238cf2a49f0e7138808408d1501d3dbb78ee67aa906db040e0636259c365ce9bbd0e3fd0c64", &(0x7f0000002b40)="f8dc9253e95b4841d7a785be0b09040a2be0ee5a60063bd240"}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002bc0)=0x80000000, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002cc0)={&(0x7f0000002c80)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(r3, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/217, 0xd9}, {&(0x7f0000001640)=""/51, 0x33}, {&(0x7f0000001680)=""/246, 0xf6}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x6, &(0x7f0000002880)=""/232, 0xe8, 0x7}, 0x10040) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000003040)=ANY=[@ANYBLOB="18000000000000100000000000000e0f35e77a6212db00000000000000007300950013569fb9e6c8e4bb659791827ec800000000200090c4a26a08ea00e978ca40771341b0e65e50d6a609ac26a65d0a05f5bc34ded7b109174030ee9ef9a749ea68dbb420fb63cddfe876c6c135cf52f1b88e58fa0f"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r4, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) [ 1391.616605] FAULT_INJECTION: forcing a failure. [ 1391.616605] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.627896] CPU: 1 PID: 4498 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1391.635075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1391.644418] Call Trace: [ 1391.646990] dump_stack+0x194/0x24d [ 1391.650595] ? arch_local_irq_restore+0x53/0x53 [ 1391.655243] should_fail+0x8c0/0xa40 [ 1391.658931] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1391.664011] ? __lock_is_held+0xb6/0x140 [ 1391.668052] ? mark_held_locks+0xaf/0x100 [ 1391.672178] ? __raw_spin_lock_init+0x1c/0x100 [ 1391.676734] ? find_held_lock+0x35/0x1d0 [ 1391.680769] ? __lock_is_held+0xb6/0x140 [ 1391.684811] ? check_same_owner+0x320/0x320 [ 1391.689104] ? d_alloc+0x269/0x340 [ 1391.692619] ? rcu_note_context_switch+0x710/0x710 [ 1391.697520] ? lock_release+0xa40/0xa40 [ 1391.701471] should_failslab+0xec/0x120 [ 1391.705421] kmem_cache_alloc+0x47/0x760 [ 1391.709457] ? d_drop+0x51/0x60 [ 1391.712712] ? rpc_i_callback+0x30/0x30 [ 1391.716663] rpc_alloc_inode+0x1a/0x20 [ 1391.720526] alloc_inode+0x65/0x180 [ 1391.724130] new_inode_pseudo+0x69/0x190 [ 1391.728169] ? prune_icache_sb+0x1a0/0x1a0 [ 1391.732380] ? do_raw_spin_trylock+0x190/0x190 [ 1391.736935] ? d_add+0xa70/0xa70 [ 1391.740276] new_inode+0x1c/0x40 [ 1391.743621] rpc_get_inode+0x20/0x1e0 [ 1391.747396] __rpc_create_common+0x5d/0x1d0 [ 1391.751691] ? __d_lookup+0x830/0x830 [ 1391.755469] rpc_populate.constprop.15+0x1ad/0x340 [ 1391.760379] rpc_fill_super+0x464/0xae0 [ 1391.764329] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1391.769495] ? security_capable+0x8e/0xc0 [ 1391.773616] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1391.778781] ? ns_capable_common+0xcf/0x160 [ 1391.783076] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1391.788241] mount_ns+0xc4/0x190 [ 1391.791582] rpc_mount+0x9e/0xd0 [ 1391.794929] mount_fs+0x66/0x2d0 [ 1391.798268] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1391.802822] ? may_umount+0xa0/0xa0 [ 1391.806424] ? _raw_read_unlock+0x22/0x30 [ 1391.810546] ? __get_fs_type+0x8a/0xc0 [ 1391.814409] do_mount+0xea4/0x2bb0 [ 1391.817924] ? copy_mount_string+0x40/0x40 [ 1391.822132] ? rcu_pm_notify+0xc0/0xc0 [ 1391.825996] ? copy_mount_options+0x5f/0x2e0 [ 1391.830380] ? rcu_read_lock_sched_held+0x108/0x120 [ 1391.835369] ? kmem_cache_alloc_trace+0x459/0x740 [ 1391.840184] ? kasan_check_write+0x14/0x20 [ 1391.844394] ? _copy_from_user+0x99/0x110 [ 1391.848514] ? copy_mount_options+0x1f7/0x2e0 [ 1391.852985] SyS_mount+0xab/0x120 [ 1391.856411] ? copy_mnt_ns+0xb30/0xb30 [ 1391.860271] do_syscall_64+0x281/0x940 [ 1391.864133] ? vmalloc_sync_all+0x30/0x30 [ 1391.868254] ? _raw_spin_unlock_irq+0x27/0x70 [ 1391.872727] ? finish_task_switch+0x1c1/0x7e0 [ 1391.877200] ? syscall_return_slowpath+0x550/0x550 [ 1391.882111] ? syscall_return_slowpath+0x2ac/0x550 [ 1391.887020] ? prepare_exit_to_usermode+0x350/0x350 [ 1391.892014] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1391.897364] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1391.902182] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1391.907345] RIP: 0033:0x454e79 [ 1391.910509] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1391.918193] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1391.925437] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1391.932684] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1391.939936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1391.947266] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000038 [ 1391.954713] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry clntXX 2018/03/30 19:09:03 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1391.986188] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory gssd 2018/03/30 19:09:03 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x0, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:03 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x0, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:03 executing program 5 (fault-call:11 fault-nth:57): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:09:03 executing program 1: mkdir(&(0x7f0000003140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x80006, 0x100000001, &(0x7f0000002d00)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002e40)={r1, &(0x7f0000002d40)="066694760bfcd9568fd4a96c2cc9b43c8f57fdcf6aaaf4ec8edbb4", &(0x7f0000002d80)="baeb1f7b930eec06d403d0b01fdf137d095cefed9cac05c37adb6c454ca8826b659c2c11801f0899ea30c0067c209d8baf13ed5e90a03fa74b1547a118b54111f889c006f64d10dc8e873eeff18226c02ffc66dcd0b2986c4f44862888baff93d3452fb50351e03722febdb355796ec26faf84177e7f64495f0dee3e562ba2d348b0f089928adeebb835411834a1331522b9cda00cbb2c71ffd15f058fb99e9193fde7ce9536ee48e7eeaa5a3dbdc6f52662ec94ea7a14eb6a", 0x1}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002c40)={&(0x7f0000002c00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='binfmt_misc\x00', 0x2, &(0x7f0000000440)="a20e263763ee05e5dc26c35e2792375a5eea08875d2660c1168382cde5e338ac676bbbe71db5d864992d49fa98ba3ef65e620575ca7f49a0dede94e3c24226c80469e46cd43eb88b03a6bede2fab80e3b2b3851c8e767424178c83b4dc724a886da2c0dab97d632b15f62e8f8e65da382b61b640ad15e9cf9b5ca85b44185963b7f400a1d87df51a2a11d8b648e012c339437e8f887d28b46adec49c7f69dd35d380cedf0ea49ae2474215a993b6d6d95641e2ee67c44447aba1fe43f598dd9c439f4a64f3110f1ad439147c09") socketpair(0x15, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)='sysv\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="0ae27bc735b9adc220c720fdf2f2e4941031f259fd386b84f832f0b4be9698f2908a53eef43aba5b20264d198c106a52e0b511a8f1eafd6ea6803d6623", &(0x7f0000000180)=""/234}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000380), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={r3, &(0x7f0000002ac0)="5b0213167ba87bb0e43160a2e0a0216e8436b9a16da43c300fb945606552efb6be4a1b182c12b37e9b92ee5057f0079c9372558d81b8b2bc4a2489402e1aad8f19f78238cf2a49f0e7138808408d1501d3dbb78ee67aa906db040e0636259c365ce9bbd0e3fd0c64", &(0x7f0000002b40)="f8dc9253e95b4841d7a785be0b09040a2be0ee5a60063bd240"}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002bc0)=0x80000000, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002cc0)={&(0x7f0000002c80)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(r3, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/217, 0xd9}, {&(0x7f0000001640)=""/51, 0x33}, {&(0x7f0000001680)=""/246, 0xf6}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x6, &(0x7f0000002880)=""/232, 0xe8, 0x7}, 0x10040) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000003040)=ANY=[@ANYBLOB="18000000000000100000000000000e0f35e77a6212db00000000000000007300950013569fb9e6c8e4bb659791827ec800000000200090c4a26a08ea00e978ca40771341b0e65e50d6a609ac26a65d0a05f5bc34ded7b109174030ee9ef9a749ea68dbb420fb63cddfe876c6c135cf52f1b88e58fa0f"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r4, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) 2018/03/30 19:09:03 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b80)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000d00)={&(0x7f0000000cc0)='./file0/bus\x00', r0}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=ANY=[@ANYBLOB="18000000000000000000000000000000050000000000000000000076f6b3f0160000000000950000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c80)) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:03 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r1, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r0, 0x50, &(0x7f0000000440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000880)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r3}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:03 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:03 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x0, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:03 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:03 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x0, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 1392.262757] FAULT_INJECTION: forcing a failure. [ 1392.262757] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.274173] CPU: 0 PID: 4569 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1392.281360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.290709] Call Trace: [ 1392.293300] dump_stack+0x194/0x24d [ 1392.296930] ? arch_local_irq_restore+0x53/0x53 [ 1392.301611] should_fail+0x8c0/0xa40 [ 1392.305339] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 1392.310356] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1392.315463] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1392.320652] ? __lock_acquire+0x664/0x3e00 [ 1392.324895] ? find_held_lock+0x35/0x1d0 [ 1392.328947] ? __lock_is_held+0xb6/0x140 [ 1392.333000] ? check_same_owner+0x320/0x320 [ 1392.337305] ? __d_lookup+0x4f4/0x830 [ 1392.341084] ? rcu_note_context_switch+0x710/0x710 [ 1392.345994] should_failslab+0xec/0x120 [ 1392.349952] kmem_cache_alloc+0x47/0x760 [ 1392.353994] __d_alloc+0xc1/0xbd0 [ 1392.357424] ? shrink_dcache_for_umount+0x290/0x290 [ 1392.362413] ? d_alloc_parallel+0x1b40/0x1b40 [ 1392.366883] ? lock_release+0xa40/0xa40 [ 1392.370838] ? mark_held_locks+0xaf/0x100 [ 1392.374960] ? d_lookup+0x133/0x2e0 [ 1392.378564] ? d_lookup+0x1d5/0x2e0 [ 1392.382166] d_alloc+0x8e/0x340 [ 1392.385420] ? __d_alloc+0xbd0/0xbd0 [ 1392.389109] ? full_name_hash+0x9b/0xe0 [ 1392.393066] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1392.398314] ? down_write+0x87/0x120 [ 1392.402003] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1392.406309] ? down_read+0x150/0x150 [ 1392.409999] ? __d_lookup+0x830/0x830 [ 1392.413780] rpc_populate.constprop.15+0xa3/0x340 [ 1392.418601] rpc_fill_super+0x831/0xae0 [ 1392.422550] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1392.427716] ? security_capable+0x8e/0xc0 [ 1392.431837] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1392.437001] ? ns_capable_common+0xcf/0x160 [ 1392.441306] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1392.446467] mount_ns+0xc4/0x190 [ 1392.449809] rpc_mount+0x9e/0xd0 [ 1392.453152] mount_fs+0x66/0x2d0 [ 1392.456491] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1392.461046] ? may_umount+0xa0/0xa0 [ 1392.464651] ? _raw_read_unlock+0x22/0x30 [ 1392.468865] ? __get_fs_type+0x8a/0xc0 [ 1392.472725] do_mount+0xea4/0x2bb0 [ 1392.476241] ? copy_mount_string+0x40/0x40 [ 1392.480451] ? rcu_pm_notify+0xc0/0xc0 [ 1392.484314] ? copy_mount_options+0x5f/0x2e0 [ 1392.488695] ? rcu_read_lock_sched_held+0x108/0x120 [ 1392.493684] ? kmem_cache_alloc_trace+0x459/0x740 [ 1392.498501] ? kasan_check_write+0x14/0x20 [ 1392.502710] ? _copy_from_user+0x99/0x110 [ 1392.506830] ? copy_mount_options+0x1f7/0x2e0 [ 1392.511299] SyS_mount+0xab/0x120 [ 1392.514728] ? copy_mnt_ns+0xb30/0xb30 [ 1392.518592] do_syscall_64+0x281/0x940 [ 1392.522452] ? vmalloc_sync_all+0x30/0x30 [ 1392.526571] ? _raw_spin_unlock_irq+0x27/0x70 [ 1392.531040] ? finish_task_switch+0x1c1/0x7e0 [ 1392.535525] ? syscall_return_slowpath+0x550/0x550 [ 1392.540600] ? syscall_return_slowpath+0x2ac/0x550 [ 1392.545506] ? prepare_exit_to_usermode+0x350/0x350 [ 1392.550495] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1392.555833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1392.560652] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1392.565815] RIP: 0033:0x454e79 [ 1392.568977] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1392.576673] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1392.583914] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1392.591157] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1392.598398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1392.605643] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000039 2018/03/30 19:09:03 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x0, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:03 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1392.612997] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory clntXX 2018/03/30 19:09:03 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x0, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:03 executing program 5 (fault-call:11 fault-nth:58): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:09:03 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800)}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:03 executing program 1: mkdir(&(0x7f0000003140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x80006, 0x100000001, &(0x7f0000002d00)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002e40)={r1, &(0x7f0000002d40)="066694760bfcd9568fd4a96c2cc9b43c8f57fdcf6aaaf4ec8edbb4", &(0x7f0000002d80)="baeb1f7b930eec06d403d0b01fdf137d095cefed9cac05c37adb6c454ca8826b659c2c11801f0899ea30c0067c209d8baf13ed5e90a03fa74b1547a118b54111f889c006f64d10dc8e873eeff18226c02ffc66dcd0b2986c4f44862888baff93d3452fb50351e03722febdb355796ec26faf84177e7f64495f0dee3e562ba2d348b0f089928adeebb835411834a1331522b9cda00cbb2c71ffd15f058fb99e9193fde7ce9536ee48e7eeaa5a3dbdc6f52662ec94ea7a14eb6a", 0x1}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002c40)={&(0x7f0000002c00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='binfmt_misc\x00', 0x2, &(0x7f0000000440)="a20e263763ee05e5dc26c35e2792375a5eea08875d2660c1168382cde5e338ac676bbbe71db5d864992d49fa98ba3ef65e620575ca7f49a0dede94e3c24226c80469e46cd43eb88b03a6bede2fab80e3b2b3851c8e767424178c83b4dc724a886da2c0dab97d632b15f62e8f8e65da382b61b640ad15e9cf9b5ca85b44185963b7f400a1d87df51a2a11d8b648e012c339437e8f887d28b46adec49c7f69dd35d380cedf0ea49ae2474215a993b6d6d95641e2ee67c44447aba1fe43f598dd9c439f4a64f3110f1ad439147c09") socketpair(0x15, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)='sysv\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="0ae27bc735b9adc220c720fdf2f2e4941031f259fd386b84f832f0b4be9698f2908a53eef43aba5b20264d198c106a52e0b511a8f1eafd6ea6803d6623", &(0x7f0000000180)=""/234}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000380), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={r3, &(0x7f0000002ac0)="5b0213167ba87bb0e43160a2e0a0216e8436b9a16da43c300fb945606552efb6be4a1b182c12b37e9b92ee5057f0079c9372558d81b8b2bc4a2489402e1aad8f19f78238cf2a49f0e7138808408d1501d3dbb78ee67aa906db040e0636259c365ce9bbd0e3fd0c64", &(0x7f0000002b40)="f8dc9253e95b4841d7a785be0b09040a2be0ee5a60063bd240"}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002bc0)=0x80000000, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002cc0)={&(0x7f0000002c80)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(r3, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/217, 0xd9}, {&(0x7f0000001640)=""/51, 0x33}, {&(0x7f0000001680)=""/246, 0xf6}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x6, &(0x7f0000002880)=""/232, 0xe8, 0x7}, 0x10040) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000003040)=ANY=[@ANYBLOB="18000000000000100000000000000e0f35e77a6212db00000000000000007300950013569fb9e6c8e4bb659791827ec800000000200090c4a26a08ea00e978ca40771341b0e65e50d6a609ac26a65d0a05f5bc34ded7b109174030ee9ef9a749ea68dbb420fb63cddfe876c6c135cf52f1b88e58fa0f"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r4, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) mount(&(0x7f00000030c0)='./file0/bus\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) 2018/03/30 19:09:04 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000e80)=""/209, 0xfffffffffffffca2}, {&(0x7f0000001080)=""/236, 0xec}, {&(0x7f0000001300)=""/66, 0x42}, {&(0x7f0000006000)=""/4096, 0xffffffffffffff1b}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000001180)=""/252, 0xfc}], 0x6, 0x0, 0x0, 0x5ea}, 0x10002) recvmsg(r1, &(0x7f0000000880)={&(0x7f0000000440)=@ipx, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000c80)=""/126, 0x7e}, {&(0x7f0000000d00)=""/78, 0x4e}, {&(0x7f0000000d80)=""/87, 0x57}], 0x3, &(0x7f0000001380)=""/235, 0xeb, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) socketpair$inet6(0xa, 0x80002, 0xff, &(0x7f0000000b80)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6e38) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:04 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x0, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:04 executing program 4: socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:04 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x0, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1392.818164] FAULT_INJECTION: forcing a failure. [ 1392.818164] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.829557] CPU: 0 PID: 4608 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1392.836740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1392.846086] Call Trace: [ 1392.848673] dump_stack+0x194/0x24d [ 1392.852298] ? arch_local_irq_restore+0x53/0x53 [ 1392.856970] should_fail+0x8c0/0xa40 [ 1392.860687] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1392.865786] ? __lock_is_held+0xb6/0x140 [ 1392.870099] ? mark_held_locks+0xaf/0x100 [ 1392.874230] ? __raw_spin_lock_init+0x1c/0x100 [ 1392.878793] ? find_held_lock+0x35/0x1d0 [ 1392.882838] ? __lock_is_held+0xb6/0x140 [ 1392.886879] ? check_same_owner+0x320/0x320 [ 1392.891175] ? d_alloc+0x269/0x340 [ 1392.894699] ? rcu_note_context_switch+0x710/0x710 [ 1392.899600] ? lock_release+0xa40/0xa40 [ 1392.903556] should_failslab+0xec/0x120 [ 1392.907507] kmem_cache_alloc+0x47/0x760 [ 1392.911551] ? d_drop+0x51/0x60 [ 1392.914806] ? rpc_i_callback+0x30/0x30 [ 1392.918753] rpc_alloc_inode+0x1a/0x20 [ 1392.922616] alloc_inode+0x65/0x180 [ 1392.926220] new_inode_pseudo+0x69/0x190 [ 1392.930256] ? prune_icache_sb+0x1a0/0x1a0 [ 1392.934469] ? do_raw_spin_trylock+0x190/0x190 [ 1392.939025] ? d_add+0xa70/0xa70 [ 1392.942367] new_inode+0x1c/0x40 [ 1392.945725] rpc_get_inode+0x20/0x1e0 [ 1392.949500] __rpc_create_common+0x5d/0x1d0 [ 1392.953794] ? __d_lookup+0x830/0x830 [ 1392.957571] rpc_populate.constprop.15+0x126/0x340 [ 1392.962476] rpc_fill_super+0x831/0xae0 [ 1392.966424] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1392.971590] ? security_capable+0x8e/0xc0 [ 1392.975714] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1392.980876] ? ns_capable_common+0xcf/0x160 [ 1392.985171] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1392.990332] mount_ns+0xc4/0x190 [ 1392.993675] rpc_mount+0x9e/0xd0 [ 1392.997019] mount_fs+0x66/0x2d0 [ 1393.000377] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1393.004932] ? may_umount+0xa0/0xa0 [ 1393.008532] ? _raw_read_unlock+0x22/0x30 [ 1393.012655] ? __get_fs_type+0x8a/0xc0 [ 1393.016517] do_mount+0xea4/0x2bb0 [ 1393.020035] ? copy_mount_string+0x40/0x40 [ 1393.024244] ? rcu_pm_notify+0xc0/0xc0 [ 1393.028108] ? copy_mount_options+0x5f/0x2e0 [ 1393.032490] ? rcu_read_lock_sched_held+0x108/0x120 [ 1393.037479] ? kmem_cache_alloc_trace+0x459/0x740 [ 1393.042294] ? kasan_check_write+0x14/0x20 [ 1393.046502] ? _copy_from_user+0x99/0x110 [ 1393.050628] ? copy_mount_options+0x1f7/0x2e0 [ 1393.055099] SyS_mount+0xab/0x120 [ 1393.058524] ? copy_mnt_ns+0xb30/0xb30 [ 1393.062386] do_syscall_64+0x281/0x940 [ 1393.066245] ? vmalloc_sync_all+0x30/0x30 [ 1393.070367] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 1393.075876] ? syscall_return_slowpath+0x550/0x550 [ 1393.080777] ? syscall_return_slowpath+0x2ac/0x550 [ 1393.085771] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1393.091123] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1393.095942] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1393.101106] RIP: 0033:0x454e79 [ 1393.104268] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1393.111951] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 2018/03/30 19:09:04 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1393.119193] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1393.126438] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1393.133680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1393.140922] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003a [ 1393.148396] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry info 2018/03/30 19:09:04 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:04 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x0, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1393.258655] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory clntXX 2018/03/30 19:09:04 executing program 1: mkdir(&(0x7f0000003140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x80006, 0x100000001, &(0x7f0000002d00)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002e40)={r1, &(0x7f0000002d40)="066694760bfcd9568fd4a96c2cc9b43c8f57fdcf6aaaf4ec8edbb4", &(0x7f0000002d80)="baeb1f7b930eec06d403d0b01fdf137d095cefed9cac05c37adb6c454ca8826b659c2c11801f0899ea30c0067c209d8baf13ed5e90a03fa74b1547a118b54111f889c006f64d10dc8e873eeff18226c02ffc66dcd0b2986c4f44862888baff93d3452fb50351e03722febdb355796ec26faf84177e7f64495f0dee3e562ba2d348b0f089928adeebb835411834a1331522b9cda00cbb2c71ffd15f058fb99e9193fde7ce9536ee48e7eeaa5a3dbdc6f52662ec94ea7a14eb6a", 0x1}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002c40)={&(0x7f0000002c00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='binfmt_misc\x00', 0x2, &(0x7f0000000440)="a20e263763ee05e5dc26c35e2792375a5eea08875d2660c1168382cde5e338ac676bbbe71db5d864992d49fa98ba3ef65e620575ca7f49a0dede94e3c24226c80469e46cd43eb88b03a6bede2fab80e3b2b3851c8e767424178c83b4dc724a886da2c0dab97d632b15f62e8f8e65da382b61b640ad15e9cf9b5ca85b44185963b7f400a1d87df51a2a11d8b648e012c339437e8f887d28b46adec49c7f69dd35d380cedf0ea49ae2474215a993b6d6d95641e2ee67c44447aba1fe43f598dd9c439f4a64f3110f1ad439147c09") socketpair(0x15, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)='sysv\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="0ae27bc735b9adc220c720fdf2f2e4941031f259fd386b84f832f0b4be9698f2908a53eef43aba5b20264d198c106a52e0b511a8f1eafd6ea6803d6623", &(0x7f0000000180)=""/234}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000380), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={r3, &(0x7f0000002ac0)="5b0213167ba87bb0e43160a2e0a0216e8436b9a16da43c300fb945606552efb6be4a1b182c12b37e9b92ee5057f0079c9372558d81b8b2bc4a2489402e1aad8f19f78238cf2a49f0e7138808408d1501d3dbb78ee67aa906db040e0636259c365ce9bbd0e3fd0c64", &(0x7f0000002b40)="f8dc9253e95b4841d7a785be0b09040a2be0ee5a60063bd240"}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002bc0)=0x80000000, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002cc0)={&(0x7f0000002c80)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(r3, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/217, 0xd9}, {&(0x7f0000001640)=""/51, 0x33}, {&(0x7f0000001680)=""/246, 0xf6}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x6, &(0x7f0000002880)=""/232, 0xe8, 0x7}, 0x10040) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000003040)=ANY=[@ANYBLOB="18000000000000100000000000000e0f35e77a6212db00000000000000007300950013569fb9e6c8e4bb659791827ec800000000200090c4a26a08ea00e978ca40771341b0e65e50d6a609ac26a65d0a05f5bc34ded7b109174030ee9ef9a749ea68dbb420fb63cddfe876c6c135cf52f1b88e58fa0f"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r4, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) mount(&(0x7f00000030c0)='./file0/bus\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) 2018/03/30 19:09:04 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x0, 0x7}, 0x2c) 2018/03/30 19:09:04 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=ANY=[@ANYBLOB="180000000000000000000000000000000500eeffffff000000000000000000009500990000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r1, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r3}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000440)="3291e5b4a19230156ac117d389b893f6e107a6414eb6a2be48f2028ec04c10f94285e5856839e224456ee40582275ab53739732fa43a8ca6db21d8a16fc9f0a500bb9fa48f14a3cd897a1500af8e4c348c046125d5c1cfc9c3619ec4c8c5437ef96d15720b51d64fe5cb42a2787267d6282f5683223ab762ec8fc685", &(0x7f0000000c80)="3df838719affefe0dfc15c19dd2f179db9b91fb3cabf6510481b9190a78c427ed4e89483577e7c5f8d738fb10b7f00e6d80e8d33b51329487ae0c8384d91fbd128c6721200c3705cb98edae72e7317a6633cfea529f7eedff700b86db9e695537bdcf7e27aacc02b11ad0339d6ee83f8592913901ea4b86f0b4ea5"}, 0x20) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:04 executing program 5 (fault-call:11 fault-nth:59): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:09:04 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:04 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000880)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0/bus\x00', 0x0, 0x8}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=ANY=[@ANYBLOB="1800000000000000000000000000000005000000000000000000000000000000950f000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f00000004c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:04 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800)}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:04 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x0, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:04 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x0, 0x7}, 0x2c) 2018/03/30 19:09:04 executing program 1: mkdir(&(0x7f0000003140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x80006, 0x100000001, &(0x7f0000002d00)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002e40)={r1, &(0x7f0000002d40)="066694760bfcd9568fd4a96c2cc9b43c8f57fdcf6aaaf4ec8edbb4", &(0x7f0000002d80)="baeb1f7b930eec06d403d0b01fdf137d095cefed9cac05c37adb6c454ca8826b659c2c11801f0899ea30c0067c209d8baf13ed5e90a03fa74b1547a118b54111f889c006f64d10dc8e873eeff18226c02ffc66dcd0b2986c4f44862888baff93d3452fb50351e03722febdb355796ec26faf84177e7f64495f0dee3e562ba2d348b0f089928adeebb835411834a1331522b9cda00cbb2c71ffd15f058fb99e9193fde7ce9536ee48e7eeaa5a3dbdc6f52662ec94ea7a14eb6a", 0x1}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002c40)={&(0x7f0000002c00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='binfmt_misc\x00', 0x2, &(0x7f0000000440)="a20e263763ee05e5dc26c35e2792375a5eea08875d2660c1168382cde5e338ac676bbbe71db5d864992d49fa98ba3ef65e620575ca7f49a0dede94e3c24226c80469e46cd43eb88b03a6bede2fab80e3b2b3851c8e767424178c83b4dc724a886da2c0dab97d632b15f62e8f8e65da382b61b640ad15e9cf9b5ca85b44185963b7f400a1d87df51a2a11d8b648e012c339437e8f887d28b46adec49c7f69dd35d380cedf0ea49ae2474215a993b6d6d95641e2ee67c44447aba1fe43f598dd9c439f4a64f3110f1ad439147c09") socketpair(0x15, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)='sysv\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="0ae27bc735b9adc220c720fdf2f2e4941031f259fd386b84f832f0b4be9698f2908a53eef43aba5b20264d198c106a52e0b511a8f1eafd6ea6803d6623", &(0x7f0000000180)=""/234}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000380), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={r3, &(0x7f0000002ac0)="5b0213167ba87bb0e43160a2e0a0216e8436b9a16da43c300fb945606552efb6be4a1b182c12b37e9b92ee5057f0079c9372558d81b8b2bc4a2489402e1aad8f19f78238cf2a49f0e7138808408d1501d3dbb78ee67aa906db040e0636259c365ce9bbd0e3fd0c64", &(0x7f0000002b40)="f8dc9253e95b4841d7a785be0b09040a2be0ee5a60063bd240"}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002bc0)=0x80000000, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002cc0)={&(0x7f0000002c80)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(r3, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/217, 0xd9}, {&(0x7f0000001640)=""/51, 0x33}, {&(0x7f0000001680)=""/246, 0xf6}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x6, &(0x7f0000002880)=""/232, 0xe8, 0x7}, 0x10040) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000003040)=ANY=[@ANYBLOB="18000000000000100000000000000e0f35e77a6212db00000000000000007300950013569fb9e6c8e4bb659791827ec800000000200090c4a26a08ea00e978ca40771341b0e65e50d6a609ac26a65d0a05f5bc34ded7b109174030ee9ef9a749ea68dbb420fb63cddfe876c6c135cf52f1b88e58fa0f"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r4, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) mount(&(0x7f00000030c0)='./file0/bus\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) 2018/03/30 19:09:04 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000d00)=@can={0x0, 0x0}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000d80)=""/223, 0xdf}, {&(0x7f00000000c0)=""/29, 0x1d}], 0x2, &(0x7f0000000e80)=""/164, 0xa4, 0x8}, 0x2000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000000c80)=@raw=[@exit={0x95}, @call={0x85, 0x0, 0x0, 0xc}, @map={0x18, 0xb, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x355, &(0x7f0000386000)=""/195, 0x0, 0x0, [], r3}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r4, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r5, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r6}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r7, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:04 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1393.570270] FAULT_INJECTION: forcing a failure. [ 1393.570270] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.581925] CPU: 0 PID: 4689 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1393.589124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1393.598647] Call Trace: [ 1393.601237] dump_stack+0x194/0x24d [ 1393.604869] ? arch_local_irq_restore+0x53/0x53 [ 1393.609553] should_fail+0x8c0/0xa40 [ 1393.613275] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1393.618386] ? __lock_is_held+0xb6/0x140 [ 1393.622446] ? mark_held_locks+0xaf/0x100 [ 1393.626594] ? __raw_spin_lock_init+0x1c/0x100 [ 1393.631179] ? find_held_lock+0x35/0x1d0 [ 1393.635245] ? __lock_is_held+0xb6/0x140 [ 1393.639309] ? check_same_owner+0x320/0x320 [ 1393.643628] ? d_alloc+0x269/0x340 [ 1393.647167] ? rcu_note_context_switch+0x710/0x710 [ 1393.652090] ? lock_release+0xa40/0xa40 [ 1393.656066] should_failslab+0xec/0x120 [ 1393.660040] kmem_cache_alloc+0x47/0x760 [ 1393.664104] ? d_drop+0x51/0x60 [ 1393.667388] ? rpc_i_callback+0x30/0x30 [ 1393.671352] rpc_alloc_inode+0x1a/0x20 [ 1393.675220] alloc_inode+0x65/0x180 [ 1393.678827] new_inode_pseudo+0x69/0x190 [ 1393.682865] ? prune_icache_sb+0x1a0/0x1a0 [ 1393.687080] ? do_raw_spin_trylock+0x190/0x190 [ 1393.691682] ? d_add+0xa70/0xa70 [ 1393.695028] new_inode+0x1c/0x40 [ 1393.698373] rpc_get_inode+0x20/0x1e0 [ 1393.702147] __rpc_create_common+0x5d/0x1d0 [ 1393.706443] rpc_mkpipe_dentry+0x122/0x360 [ 1393.710654] rpc_fill_super+0x85e/0xae0 [ 1393.714606] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1393.719770] ? security_capable+0x8e/0xc0 [ 1393.723903] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1393.729069] ? ns_capable_common+0xcf/0x160 [ 1393.733367] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1393.738531] mount_ns+0xc4/0x190 [ 1393.741909] rpc_mount+0x9e/0xd0 [ 1393.745251] mount_fs+0x66/0x2d0 [ 1393.748592] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1393.753151] ? may_umount+0xa0/0xa0 [ 1393.756752] ? _raw_read_unlock+0x22/0x30 [ 1393.760876] ? __get_fs_type+0x8a/0xc0 [ 1393.764746] do_mount+0xea4/0x2bb0 [ 1393.768263] ? copy_mount_string+0x40/0x40 [ 1393.772471] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1393.777460] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1393.782192] ? retint_kernel+0x10/0x10 [ 1393.786058] ? copy_mount_options+0x18b/0x2e0 [ 1393.790527] ? audit_kill_trees+0x430/0x430 [ 1393.794827] ? copy_mount_options+0x1f7/0x2e0 [ 1393.799294] SyS_mount+0xab/0x120 [ 1393.802718] ? copy_mnt_ns+0xb30/0xb30 [ 1393.806581] do_syscall_64+0x281/0x940 [ 1393.810439] ? vmalloc_sync_all+0x30/0x30 [ 1393.814562] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 1393.820072] ? syscall_return_slowpath+0x550/0x550 [ 1393.824973] ? syscall_return_slowpath+0x2ac/0x550 [ 1393.829876] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1393.835214] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1393.840035] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1393.845196] RIP: 0033:0x454e79 [ 1393.848360] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1393.856042] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1393.863282] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 2018/03/30 19:09:05 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=ANY=[@ANYBLOB="1800000000000500580000000005000038c1000000400000001b0000000000000000000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000440)) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:05 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x0, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1393.870532] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1393.877774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1393.885020] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003b [ 1393.892603] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry gssd 2018/03/30 19:09:05 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x0, 0x7}, 0x2c) 2018/03/30 19:09:05 executing program 1: mkdir(&(0x7f0000003140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x80006, 0x100000001, &(0x7f0000002d00)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002e40)={r1, &(0x7f0000002d40)="066694760bfcd9568fd4a96c2cc9b43c8f57fdcf6aaaf4ec8edbb4", &(0x7f0000002d80)="baeb1f7b930eec06d403d0b01fdf137d095cefed9cac05c37adb6c454ca8826b659c2c11801f0899ea30c0067c209d8baf13ed5e90a03fa74b1547a118b54111f889c006f64d10dc8e873eeff18226c02ffc66dcd0b2986c4f44862888baff93d3452fb50351e03722febdb355796ec26faf84177e7f64495f0dee3e562ba2d348b0f089928adeebb835411834a1331522b9cda00cbb2c71ffd15f058fb99e9193fde7ce9536ee48e7eeaa5a3dbdc6f52662ec94ea7a14eb6a", 0x1}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002c40)={&(0x7f0000002c00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='binfmt_misc\x00', 0x2, &(0x7f0000000440)="a20e263763ee05e5dc26c35e2792375a5eea08875d2660c1168382cde5e338ac676bbbe71db5d864992d49fa98ba3ef65e620575ca7f49a0dede94e3c24226c80469e46cd43eb88b03a6bede2fab80e3b2b3851c8e767424178c83b4dc724a886da2c0dab97d632b15f62e8f8e65da382b61b640ad15e9cf9b5ca85b44185963b7f400a1d87df51a2a11d8b648e012c339437e8f887d28b46adec49c7f69dd35d380cedf0ea49ae2474215a993b6d6d95641e2ee67c44447aba1fe43f598dd9c439f4a64f3110f1ad439147c09") socketpair(0x15, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)='sysv\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="0ae27bc735b9adc220c720fdf2f2e4941031f259fd386b84f832f0b4be9698f2908a53eef43aba5b20264d198c106a52e0b511a8f1eafd6ea6803d6623", &(0x7f0000000180)=""/234}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000380), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={r3, &(0x7f0000002ac0)="5b0213167ba87bb0e43160a2e0a0216e8436b9a16da43c300fb945606552efb6be4a1b182c12b37e9b92ee5057f0079c9372558d81b8b2bc4a2489402e1aad8f19f78238cf2a49f0e7138808408d1501d3dbb78ee67aa906db040e0636259c365ce9bbd0e3fd0c64", &(0x7f0000002b40)="f8dc9253e95b4841d7a785be0b09040a2be0ee5a60063bd240"}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002bc0)=0x80000000, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002cc0)={&(0x7f0000002c80)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(r3, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/217, 0xd9}, {&(0x7f0000001640)=""/51, 0x33}, {&(0x7f0000001680)=""/246, 0xf6}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x6, &(0x7f0000002880)=""/232, 0xe8, 0x7}, 0x10040) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000003040)=ANY=[@ANYBLOB="18000000000000100000000000000e0f35e77a6212db00000000000000007300950013569fb9e6c8e4bb659791827ec800000000200090c4a26a08ea00e978ca40771341b0e65e50d6a609ac26a65d0a05f5bc34ded7b109174030ee9ef9a749ea68dbb420fb63cddfe876c6c135cf52f1b88e58fa0f"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r4, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f00000030c0)='./file0/bus\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) [ 1393.944619] net/sunrpc/rpc_pipe.c: rpc_mkpipe_dentry() failed to create pipe clntXX/gssd (errno = -12) 2018/03/30 19:09:05 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800)}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:05 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b80)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xfffffffffffffffd, 0x2000000000000064, &(0x7f0000002000)=ANY=[@ANYBLOB="18000000400000000000000000000000050000000000000000000000000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000000d80)=""/195, 0x0, 0x1}, 0x20) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r1, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r3}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:05 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r4, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r6}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f00000000c0)={r2, r0}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r7, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:05 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d}, 0x2c) 2018/03/30 19:09:05 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:05 executing program 1: mkdir(&(0x7f0000003140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x80006, 0x100000001, &(0x7f0000002d00)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002e40)={r1, &(0x7f0000002d40)="066694760bfcd9568fd4a96c2cc9b43c8f57fdcf6aaaf4ec8edbb4", &(0x7f0000002d80)="baeb1f7b930eec06d403d0b01fdf137d095cefed9cac05c37adb6c454ca8826b659c2c11801f0899ea30c0067c209d8baf13ed5e90a03fa74b1547a118b54111f889c006f64d10dc8e873eeff18226c02ffc66dcd0b2986c4f44862888baff93d3452fb50351e03722febdb355796ec26faf84177e7f64495f0dee3e562ba2d348b0f089928adeebb835411834a1331522b9cda00cbb2c71ffd15f058fb99e9193fde7ce9536ee48e7eeaa5a3dbdc6f52662ec94ea7a14eb6a", 0x1}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002c40)={&(0x7f0000002c00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='binfmt_misc\x00', 0x2, &(0x7f0000000440)="a20e263763ee05e5dc26c35e2792375a5eea08875d2660c1168382cde5e338ac676bbbe71db5d864992d49fa98ba3ef65e620575ca7f49a0dede94e3c24226c80469e46cd43eb88b03a6bede2fab80e3b2b3851c8e767424178c83b4dc724a886da2c0dab97d632b15f62e8f8e65da382b61b640ad15e9cf9b5ca85b44185963b7f400a1d87df51a2a11d8b648e012c339437e8f887d28b46adec49c7f69dd35d380cedf0ea49ae2474215a993b6d6d95641e2ee67c44447aba1fe43f598dd9c439f4a64f3110f1ad439147c09") socketpair(0x15, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)='sysv\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="0ae27bc735b9adc220c720fdf2f2e4941031f259fd386b84f832f0b4be9698f2908a53eef43aba5b20264d198c106a52e0b511a8f1eafd6ea6803d6623", &(0x7f0000000180)=""/234}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000380), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={r3, &(0x7f0000002ac0)="5b0213167ba87bb0e43160a2e0a0216e8436b9a16da43c300fb945606552efb6be4a1b182c12b37e9b92ee5057f0079c9372558d81b8b2bc4a2489402e1aad8f19f78238cf2a49f0e7138808408d1501d3dbb78ee67aa906db040e0636259c365ce9bbd0e3fd0c64", &(0x7f0000002b40)="f8dc9253e95b4841d7a785be0b09040a2be0ee5a60063bd240"}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002bc0)=0x80000000, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002cc0)={&(0x7f0000002c80)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(r3, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/217, 0xd9}, {&(0x7f0000001640)=""/51, 0x33}, {&(0x7f0000001680)=""/246, 0xf6}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x6, &(0x7f0000002880)=""/232, 0xe8, 0x7}, 0x10040) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000003040)=ANY=[@ANYBLOB="18000000000000100000000000000e0f35e77a6212db00000000000000007300950013569fb9e6c8e4bb659791827ec800000000200090c4a26a08ea00e978ca40771341b0e65e50d6a609ac26a65d0a05f5bc34ded7b109174030ee9ef9a749ea68dbb420fb63cddfe876c6c135cf52f1b88e58fa0f"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r4, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f00000030c0)='./file0/bus\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) 2018/03/30 19:09:05 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x0, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:05 executing program 5 (fault-call:11 fault-nth:60): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:09:05 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d}, 0x2c) [ 1394.236924] FAULT_INJECTION: forcing a failure. [ 1394.236924] name failslab, interval 1, probability 0, space 0, times 0 [ 1394.248322] CPU: 0 PID: 4766 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1394.255514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1394.264869] Call Trace: [ 1394.267459] dump_stack+0x194/0x24d [ 1394.271101] ? arch_local_irq_restore+0x53/0x53 [ 1394.275758] should_fail+0x8c0/0xa40 [ 1394.279456] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1394.284543] ? __lock_is_held+0xb6/0x140 [ 1394.288581] ? mark_held_locks+0xaf/0x100 [ 1394.292702] ? __raw_spin_lock_init+0x1c/0x100 [ 1394.297258] ? find_held_lock+0x35/0x1d0 [ 1394.301294] ? __lock_is_held+0xb6/0x140 [ 1394.305333] ? check_same_owner+0x320/0x320 [ 1394.309632] ? d_alloc+0x269/0x340 [ 1394.313147] ? rcu_note_context_switch+0x710/0x710 [ 1394.318048] ? lock_release+0xa40/0xa40 [ 1394.322001] should_failslab+0xec/0x120 [ 1394.325953] kmem_cache_alloc+0x47/0x760 [ 1394.329988] ? d_drop+0x51/0x60 [ 1394.333248] ? rpc_i_callback+0x30/0x30 [ 1394.337194] rpc_alloc_inode+0x1a/0x20 [ 1394.341054] alloc_inode+0x65/0x180 [ 1394.344656] new_inode_pseudo+0x69/0x190 [ 1394.348694] ? prune_icache_sb+0x1a0/0x1a0 [ 1394.352903] ? do_raw_spin_trylock+0x190/0x190 [ 1394.357464] ? d_add+0xa70/0xa70 [ 1394.360808] new_inode+0x1c/0x40 [ 1394.364153] rpc_get_inode+0x20/0x1e0 [ 1394.367931] __rpc_create_common+0x5d/0x1d0 [ 1394.372227] ? __d_lookup+0x830/0x830 [ 1394.376004] rpc_populate.constprop.15+0x126/0x340 [ 1394.380915] rpc_fill_super+0x831/0xae0 [ 1394.384865] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1394.390031] ? security_capable+0x8e/0xc0 [ 1394.394156] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1394.399319] ? ns_capable_common+0xcf/0x160 [ 1394.403616] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1394.408781] mount_ns+0xc4/0x190 [ 1394.412125] rpc_mount+0x9e/0xd0 [ 1394.415468] mount_fs+0x66/0x2d0 [ 1394.418813] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1394.423367] ? may_umount+0xa0/0xa0 [ 1394.426968] ? _raw_read_unlock+0x22/0x30 [ 1394.431091] ? __get_fs_type+0x8a/0xc0 [ 1394.434952] do_mount+0xea4/0x2bb0 [ 1394.438467] ? copy_mount_string+0x40/0x40 [ 1394.442678] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1394.447668] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1394.452401] ? retint_kernel+0x10/0x10 [ 1394.456264] ? copy_mount_options+0x18b/0x2e0 [ 1394.460732] ? copy_mount_options+0x191/0x2e0 [ 1394.465200] ? copy_mount_options+0x1f7/0x2e0 [ 1394.469669] SyS_mount+0xab/0x120 [ 1394.473096] ? copy_mnt_ns+0xb30/0xb30 [ 1394.476958] do_syscall_64+0x281/0x940 [ 1394.480819] ? vmalloc_sync_all+0x30/0x30 [ 1394.484939] ? _raw_spin_unlock_irq+0x27/0x70 [ 1394.489410] ? finish_task_switch+0x1c1/0x7e0 [ 1394.493878] ? syscall_return_slowpath+0x550/0x550 [ 1394.498781] ? syscall_return_slowpath+0x2ac/0x550 [ 1394.503682] ? prepare_exit_to_usermode+0x350/0x350 [ 1394.508672] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1394.514013] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1394.518835] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1394.523999] RIP: 0033:0x454e79 [ 1394.527167] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 19:09:05 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1394.534847] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1394.542262] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1394.549597] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1394.556840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1394.564092] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003c [ 1394.571516] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry info 2018/03/30 19:09:05 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 1394.582829] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory clntXX 2018/03/30 19:09:05 executing program 5 (fault-call:11 fault-nth:61): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) [ 1394.755000] FAULT_INJECTION: forcing a failure. [ 1394.755000] name failslab, interval 1, probability 0, space 0, times 0 [ 1394.766455] CPU: 1 PID: 4801 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1394.773635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1394.782966] Call Trace: [ 1394.785537] dump_stack+0x194/0x24d [ 1394.789139] ? arch_local_irq_restore+0x53/0x53 [ 1394.793791] should_fail+0x8c0/0xa40 [ 1394.797479] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1394.802561] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 1394.807735] ? __lock_acquire+0x664/0x3e00 [ 1394.811949] ? __lock_acquire+0x664/0x3e00 [ 1394.816158] ? find_held_lock+0x35/0x1d0 [ 1394.820195] ? __lock_is_held+0xb6/0x140 [ 1394.824238] ? check_same_owner+0x320/0x320 [ 1394.828535] ? __d_lookup+0x4f4/0x830 [ 1394.832310] ? rcu_note_context_switch+0x710/0x710 [ 1394.837219] should_failslab+0xec/0x120 [ 1394.842013] kmem_cache_alloc+0x47/0x760 [ 1394.846145] __d_alloc+0xc1/0xbd0 [ 1394.849575] ? shrink_dcache_for_umount+0x290/0x290 [ 1394.854566] ? d_alloc_parallel+0x1b40/0x1b40 [ 1394.859040] ? lock_release+0xa40/0xa40 [ 1394.862993] ? mark_held_locks+0xaf/0x100 [ 1394.867115] ? d_lookup+0x133/0x2e0 [ 1394.870716] ? d_lookup+0x1d5/0x2e0 [ 1394.874320] ? current_kernel_time64+0x1d4/0x2f0 [ 1394.879051] d_alloc+0x8e/0x340 [ 1394.882307] ? __d_alloc+0xbd0/0xbd0 [ 1394.885996] ? full_name_hash+0x9b/0xe0 [ 1394.889955] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1394.895206] ? down_write_nested+0x8b/0x120 [ 1394.899500] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1394.903709] ? _down_write_nest_lock+0x120/0x120 [ 1394.908441] ? __d_lookup+0x830/0x830 [ 1394.912221] rpc_mkpipe_dentry+0xf8/0x360 [ 1394.916346] rpc_fill_super+0x85e/0xae0 [ 1394.920295] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1394.925459] ? security_capable+0x8e/0xc0 [ 1394.929583] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1394.934749] ? ns_capable_common+0xcf/0x160 [ 1394.939048] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1394.944211] mount_ns+0xc4/0x190 [ 1394.947551] rpc_mount+0x9e/0xd0 [ 1394.950893] mount_fs+0x66/0x2d0 [ 1394.954236] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1394.958793] ? may_umount+0xa0/0xa0 [ 1394.962394] ? _raw_read_unlock+0x22/0x30 [ 1394.966516] ? __get_fs_type+0x8a/0xc0 [ 1394.970381] do_mount+0xea4/0x2bb0 [ 1394.973897] ? copy_mount_string+0x40/0x40 [ 1394.978109] ? rcu_pm_notify+0xc0/0xc0 [ 1394.981987] ? copy_mount_options+0x5f/0x2e0 [ 1394.986368] ? rcu_read_lock_sched_held+0x108/0x120 [ 1394.991362] ? kmem_cache_alloc_trace+0x459/0x740 [ 1394.996177] ? kasan_check_write+0x14/0x20 [ 1395.000396] ? copy_mount_options+0x1f7/0x2e0 [ 1395.004866] SyS_mount+0xab/0x120 [ 1395.008293] ? copy_mnt_ns+0xb30/0xb30 [ 1395.012155] do_syscall_64+0x281/0x940 [ 1395.016020] ? vmalloc_sync_all+0x30/0x30 [ 1395.020145] ? _raw_spin_unlock_irq+0x27/0x70 [ 1395.024614] ? finish_task_switch+0x1c1/0x7e0 [ 1395.029086] ? syscall_return_slowpath+0x550/0x550 [ 1395.033991] ? syscall_return_slowpath+0x2ac/0x550 [ 1395.038985] ? prepare_exit_to_usermode+0x350/0x350 [ 1395.043976] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1395.049317] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1395.054133] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1395.059644] RIP: 0033:0x454e79 [ 1395.062808] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1395.070489] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1395.077730] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1395.085147] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1395.092391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1395.099635] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003d 2018/03/30 19:09:06 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x0, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:06 executing program 7: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r0, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) socketpair$ax25(0x3, 0x0, 0xcf, &(0x7f0000000440)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x0, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:06 executing program 6: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d}, 0x2c) 2018/03/30 19:09:06 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 19:09:06 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x0) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:06 executing program 5 (fault-call:11 fault-nth:62): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xed, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be") bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000040)}, 0x20) 2018/03/30 19:09:06 executing program 1: mkdir(&(0x7f0000003140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x80006, 0x100000001, &(0x7f0000002d00)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002e40)={r1, &(0x7f0000002d40)="066694760bfcd9568fd4a96c2cc9b43c8f57fdcf6aaaf4ec8edbb4", &(0x7f0000002d80)="baeb1f7b930eec06d403d0b01fdf137d095cefed9cac05c37adb6c454ca8826b659c2c11801f0899ea30c0067c209d8baf13ed5e90a03fa74b1547a118b54111f889c006f64d10dc8e873eeff18226c02ffc66dcd0b2986c4f44862888baff93d3452fb50351e03722febdb355796ec26faf84177e7f64495f0dee3e562ba2d348b0f089928adeebb835411834a1331522b9cda00cbb2c71ffd15f058fb99e9193fde7ce9536ee48e7eeaa5a3dbdc6f52662ec94ea7a14eb6a", 0x1}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002c40)={&(0x7f0000002c00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='binfmt_misc\x00', 0x2, &(0x7f0000000440)="a20e263763ee05e5dc26c35e2792375a5eea08875d2660c1168382cde5e338ac676bbbe71db5d864992d49fa98ba3ef65e620575ca7f49a0dede94e3c24226c80469e46cd43eb88b03a6bede2fab80e3b2b3851c8e767424178c83b4dc724a886da2c0dab97d632b15f62e8f8e65da382b61b640ad15e9cf9b5ca85b44185963b7f400a1d87df51a2a11d8b648e012c339437e8f887d28b46adec49c7f69dd35d380cedf0ea49ae2474215a993b6d6d95641e2ee67c44447aba1fe43f598dd9c439f4a64f3110f1ad439147c09") socketpair(0x15, 0x80000, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mount(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)='sysv\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)="0ae27bc735b9adc220c720fdf2f2e4941031f259fd386b84f832f0b4be9698f2908a53eef43aba5b20264d198c106a52e0b511a8f1eafd6ea6803d6623", &(0x7f0000000180)=""/234}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000380), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002b80)={r3, &(0x7f0000002ac0)="5b0213167ba87bb0e43160a2e0a0216e8436b9a16da43c300fb945606552efb6be4a1b182c12b37e9b92ee5057f0079c9372558d81b8b2bc4a2489402e1aad8f19f78238cf2a49f0e7138808408d1501d3dbb78ee67aa906db040e0636259c365ce9bbd0e3fd0c64", &(0x7f0000002b40)="f8dc9253e95b4841d7a785be0b09040a2be0ee5a60063bd240"}, 0x20) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000002bc0)=0x80000000, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002cc0)={&(0x7f0000002c80)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(r3, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/217, 0xd9}, {&(0x7f0000001640)=""/51, 0x33}, {&(0x7f0000001680)=""/246, 0xf6}, {&(0x7f0000001780)=""/91, 0x5b}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x6, &(0x7f0000002880)=""/232, 0xe8, 0x7}, 0x10040) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x10000000000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000003040)=ANY=[@ANYBLOB="18000000000000100000000000000e0f35e77a6212db00000000000000007300950013569fb9e6c8e4bb659791827ec800000000200090c4a26a08ea00e978ca40771341b0e65e50d6a609ac26a65d0a05f5bc34ded7b109174030ee9ef9a749ea68dbb420fb63cddfe876c6c135cf52f1b88e58fa0f"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r4, 0x0, 0xef, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x7, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f00000030c0)='./file0/bus\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) 2018/03/30 19:09:06 executing program 4: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) mount(&(0x7f0000000d00)='./file0/bus\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='devtmpfs\x00', 0x12, &(0x7f0000000dc0)="60df2bbfcdb25a6ee53e7c8350b5151a0c695d18a50144410c96e35347a6186ad489045fb43a7885a6aa03759f98fe7e476793e0f5fa6da20219bdec72d863e7f9175e38af18602c9661ebecde8223a5c680e75a39a6b04b17516f83f2420a56fb6cb7d2970d2659f9774d22a6a5828a78a6751203ef10c39ac0c4d8f4501df3d93b079babcb1a273f049691c4dd26199060dcba") socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000000c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001340)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) recvmsg(r3, &(0x7f0000001240)={&(0x7f0000000e80)=@ax25, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000f00)=""/125, 0x7d}, {&(0x7f0000001080)=""/176, 0xb0}], 0x2, &(0x7f0000001140)=""/221, 0xdd, 0x1}, 0x22) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000cc0)={&(0x7f0000000c80)='./file0\x00', r6}, 0x10) 2018/03/30 19:09:06 executing program 3: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x0, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") [ 1395.255857] tmpfs: No value for mount option '`ß+¿Í²Znå>|ƒPµ i]¥DA –ãSG¦jÔ‰_´:x…¦ªuŸ˜þ~Gg“àõúm¢½ìrØcçù^8¯`' [ 1395.277741] FAULT_INJECTION: forcing a failure. [ 1395.277741] name failslab, interval 1, probability 0, space 0, times 0 [ 1395.289244] CPU: 1 PID: 4836 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1395.296430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 2018/03/30 19:09:06 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x0) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r6, 0xf, r5, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)="01f866000fca3eb4d514a8f42a35b8261990ef21260771a168cd53417c023a22539fd5c605b82538fa22219bb319d9ac6e148a4f9400b63ac15a2b43aafc9169dde3edc715cbafbf93412dc4cd6cc9f476dd5ab9ddc3a4abca43348451739b70528c545c7dc399bd8f561cb27daeff5d43cdd39bd0bf68567902945bbecc5355a8b4d2348c1a91ab3ce4051e9397fdb33e0c41e8407abadcc0b26a60a7cdd786dfa622e32b06310000000000000000000000", 0x1000023, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 19:09:06 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x0, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r5, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r5, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 1395.305775] Call Trace: [ 1395.308361] dump_stack+0x194/0x24d [ 1395.311988] ? arch_local_irq_restore+0x53/0x53 [ 1395.316660] should_fail+0x8c0/0xa40 [ 1395.320369] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1395.325466] ? __lock_is_held+0xb6/0x140 [ 1395.329613] ? mark_held_locks+0xaf/0x100 [ 1395.333755] ? __raw_spin_lock_init+0x1c/0x100 [ 1395.338335] ? find_held_lock+0x35/0x1d0 [ 1395.342394] ? __lock_is_held+0xb6/0x140 [ 1395.346457] ? check_same_owner+0x320/0x320 [ 1395.350770] ? d_alloc+0x269/0x340 [ 1395.354308] ? rcu_note_context_switch+0x710/0x710 [ 1395.359235] ? lock_release+0xa40/0xa40 [ 1395.363215] should_failslab+0xec/0x120 [ 1395.367191] kmem_cache_alloc+0x47/0x760 [ 1395.371246] ? d_drop+0x51/0x60 [ 1395.374518] ? rpc_i_callback+0x30/0x30 [ 1395.378486] rpc_alloc_inode+0x1a/0x20 [ 1395.382369] alloc_inode+0x65/0x180 [ 1395.385989] new_inode_pseudo+0x69/0x190 [ 1395.390045] ? prune_icache_sb+0x1a0/0x1a0 [ 1395.394271] ? do_raw_spin_trylock+0x190/0x190 [ 1395.398845] ? d_add+0xa70/0xa70 [ 1395.402215] new_inode+0x1c/0x40 [ 1395.405579] rpc_get_inode+0x20/0x1e0 [ 1395.409374] __rpc_create_common+0x5d/0x1d0 [ 1395.413691] rpc_mkpipe_dentry+0x122/0x360 [ 1395.417996] nfs4blocklayout_register_sb+0x4b/0x70 [ 1395.422924] rpc_pipefs_event+0x3a4/0x480 [ 1395.427067] ? nfs4blocklayout_net_init+0x460/0x460 [ 1395.432075] ? lock_release+0xa40/0xa40 [ 1395.436040] ? check_same_owner+0x320/0x320 [ 1395.440371] ? dput.part.20+0x1d9/0x830 [ 1395.444352] notifier_call_chain+0x136/0x2c0 [ 1395.448763] ? unregister_die_notifier+0x20/0x20 [ 1395.453519] ? down_read+0x96/0x150 [ 1395.457135] ? blocking_notifier_call_chain+0xe1/0x190 [ 1395.462395] ? __down_interruptible+0x6b0/0x6b0 [ 1395.467048] ? _raw_spin_unlock+0x22/0x30 [ 1395.471528] blocking_notifier_call_chain+0x102/0x190 [ 1395.476697] ? srcu_init_notifier_head+0x80/0x80 [ 1395.481434] rpc_fill_super+0x525/0xae0 [ 1395.485386] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1395.490550] ? security_capable+0x8e/0xc0 [ 1395.494673] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1395.499835] ? ns_capable_common+0xcf/0x160 [ 1395.504133] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1395.509297] mount_ns+0xc4/0x190 [ 1395.512641] rpc_mount+0x9e/0xd0 [ 1395.515983] mount_fs+0x66/0x2d0 [ 1395.519324] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1395.523879] ? may_umount+0xa0/0xa0 [ 1395.527485] ? _raw_read_unlock+0x22/0x30 [ 1395.531609] ? __get_fs_type+0x8a/0xc0 [ 1395.535471] do_mount+0xea4/0x2bb0 [ 1395.538988] ? copy_mount_string+0x40/0x40 [ 1395.543197] ? rcu_pm_notify+0xc0/0xc0 [ 1395.547060] ? copy_mount_options+0x5f/0x2e0 [ 1395.551440] ? rcu_read_lock_sched_held+0x108/0x120 [ 1395.556431] ? kmem_cache_alloc_trace+0x459/0x740 [ 1395.561246] ? kasan_check_write+0x14/0x20 [ 1395.565456] ? _copy_from_user+0x99/0x110 [ 1395.569579] ? copy_mount_options+0x1f7/0x2e0 [ 1395.574051] SyS_mount+0xab/0x120 [ 1395.577483] ? copy_mnt_ns+0xb30/0xb30 [ 1395.581345] do_syscall_64+0x281/0x940 [ 1395.585207] ? vmalloc_sync_all+0x30/0x30 [ 1395.589329] ? _raw_spin_unlock_irq+0x27/0x70 [ 1395.593799] ? finish_task_switch+0x1c1/0x7e0 [ 1395.598266] ? syscall_return_slowpath+0x550/0x550 [ 1395.603180] ? syscall_return_slowpath+0x2ac/0x550 [ 1395.608095] ? prepare_exit_to_usermode+0x350/0x350 [ 1395.613091] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1395.618429] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1395.623246] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1395.628408] RIP: 0033:0x454e79 [ 1395.631573] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1395.639341] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1395.646671] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 2018/03/30 19:09:06 executing program 6 (fault-call:6 fault-nth:0): socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={0xffffffffffffffff, 0x0, 0x5a, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r0, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c13") recvmsg(r2, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='ufs\x00', 0x1002000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 1395.653914] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1395.661158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1395.668403] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003e [ 1395.675823] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry blocklayout [ 1395.691111] net/sunrpc/rpc_pipe.c: rpc_mkpipe_dentry() failed to create pipe nfs/blocklayout (errno = -12) [ 1395.701720] list_del corruption. prev->next should be 0000000015de4df1, but was 00000000701dbf73 [ 1395.711567] ------------[ cut here ]------------ [ 1395.716313] kernel BUG at lib/list_debug.c:53! [ 1395.720923] invalid opcode: 0000 [#1] SMP KASAN [ 1395.723435] tmpfs: No value for mount option '`ß+¿Í²Znå>|ƒPµ i]¥DA –ãSG¦jÔ‰_´:x…¦ªuŸ˜þ~Gg“àõúm¢½ìrØcçù^8¯`' [ 1395.725574] Dumping ftrace buffer: [ 1395.725579] (ftrace buffer empty) [ 1395.725582] Modules linked in: [ 1395.725594] CPU: 1 PID: 4836 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 1395.725599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1395.725612] RIP: 0010:__list_del_entry_valid+0xef/0x150 [ 1395.725620] RSP: 0018:ffff8801cb6d77a0 EFLAGS: 00010282 [ 1395.773918] RAX: 0000000000000054 RBX: ffff8801966c73e0 RCX: 0000000000000000 [ 1395.781159] RDX: 0000000000000054 RSI: ffffc900062c6000 RDI: ffffed00396daee8 [ 1395.788400] RBP: ffff8801cb6d77b8 R08: 1ffff100396dae40 R09: 0000000000000000 [ 1395.795644] R10: ffff8801cb6d7778 R11: 0000000000000000 R12: ffff8801d52093d0 [ 1395.802884] R13: 1ffff100396daefd R14: ffff880196663260 R15: dffffc0000000000 [ 1395.810128] FS: 00007fd503188700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 1395.818323] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1395.824193] CR2: 00007ffd8005fa60 CR3: 00000001b48a5002 CR4: 00000000001606e0 [ 1395.831438] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1395.838687] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1395.845937] Call Trace: [ 1395.848518] __dentry_kill+0x260/0x700 [ 1395.852377] ? check_and_drop+0x1b0/0x1b0 [ 1395.856501] ? d_path+0x930/0x930 [ 1395.859931] ? rcu_note_context_switch+0x710/0x710 [ 1395.864833] dput.part.20+0x5a0/0x830 [ 1395.868603] ? d_path+0x930/0x930 [ 1395.872046] ? rpc_show_info+0x460/0x460 [ 1395.876079] ? d_delete+0x181/0x280 [ 1395.879679] dput+0x1f/0x30 [ 1395.882583] rpc_fill_super+0x628/0xae0 [ 1395.886529] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1395.891692] ? security_capable+0x8e/0xc0 [ 1395.895813] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1395.900975] ? ns_capable_common+0xcf/0x160 [ 1395.905269] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1395.910433] mount_ns+0xc4/0x190 [ 1395.913772] rpc_mount+0x9e/0xd0 [ 1395.917109] mount_fs+0x66/0x2d0 [ 1395.920447] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1395.924999] ? may_umount+0xa0/0xa0 [ 1395.928603] ? _raw_read_unlock+0x22/0x30 [ 1395.932720] ? __get_fs_type+0x8a/0xc0 [ 1395.936582] do_mount+0xea4/0x2bb0 [ 1395.940093] ? copy_mount_string+0x40/0x40 [ 1395.944299] ? rcu_pm_notify+0xc0/0xc0 [ 1395.948157] ? copy_mount_options+0x5f/0x2e0 [ 1395.952536] ? rcu_read_lock_sched_held+0x108/0x120 [ 1395.957524] ? kmem_cache_alloc_trace+0x459/0x740 [ 1395.962340] ? kasan_check_write+0x14/0x20 [ 1395.966548] ? _copy_from_user+0x99/0x110 [ 1395.970666] ? copy_mount_options+0x1f7/0x2e0 [ 1395.975132] SyS_mount+0xab/0x120 [ 1395.978556] ? copy_mnt_ns+0xb30/0xb30 [ 1395.982417] do_syscall_64+0x281/0x940 [ 1395.986275] ? vmalloc_sync_all+0x30/0x30 [ 1395.990422] ? _raw_spin_unlock_irq+0x27/0x70 [ 1395.995238] ? finish_task_switch+0x1c1/0x7e0 [ 1395.999706] ? syscall_return_slowpath+0x550/0x550 [ 1396.004606] ? syscall_return_slowpath+0x2ac/0x550 [ 1396.009518] ? prepare_exit_to_usermode+0x350/0x350 [ 1396.014511] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1396.019851] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1396.024668] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1396.029828] RIP: 0033:0x454e79 [ 1396.032995] RSP: 002b:00007fd503187c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1396.040764] RAX: ffffffffffffffda RBX: 00007fd5031886d4 RCX: 0000000000454e79 [ 1396.048006] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 1396.055251] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 1396.062491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1396.069731] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003e [ 1396.076973] Code: 4c 89 e2 48 c7 c7 00 bf 75 87 e8 f5 cc 46 fe 0f 0b 48 c7 c7 60 bf 75 87 e8 e7 cc 46 fe 0f 0b 48 c7 c7 c0 bf 75 87 e8 d9 cc 46 fe <0f> 0b 48 c7 c7 20 c0 75 87 e8 cb cc 46 fe 0f 0b 48 89 df 48 89 [ 1396.096079] RIP: __list_del_entry_valid+0xef/0x150 RSP: ffff8801cb6d77a0 [ 1396.102921] ---[ end trace 1e321d1262c5b261 ]--- [ 1396.107674] Kernel panic - not syncing: Fatal exception [ 1396.113456] Dumping ftrace buffer: [ 1396.116974] (ftrace buffer empty) [ 1396.120652] Kernel Offset: disabled [ 1396.124247] Rebooting in 86400 seconds..