c9938f44892117d0800d5e2a74db33cadd0ffd9e581262184b29c8457e71f3aa320cb3178a05c083578f697d2b311df255db80038f83c8762586f54e0502dedcd46ce7f8e07c511b4a62cabd1895f6550502557120ce478e2456eb833118b12853b71ce8355d8a124814ff7c6abc33b8882d635e21ebf23f57e22349620b8e9aa21b884170e7e5c9a72929ecb3437d2b47e63f4077a652dcd1bb6cf72934b913ab210b7c95cb417a47bfdae285d76698e6309af3cb06fc8210fb9bf1268cb9fa6c823f9d8e02b0aaca5042c519") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:24 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:24 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={r0, &(0x7f0000000540)="84d18b8ebb974ecc1fefb9dd598cd75da97ef8a1af11c159a991f55f6266e286b09c6386dd063a98467bacbcf936ccd0b3fb4e07ec8795e5b699bfd6566bb82bd513dda7219ed1338dca0d1837e218515cbcf464102f1042448116357a783ca82536a72a71a85171233cf70d156e615c7418fb732283d572f341f7164f876f4760601fa26464eebfa790f64994afba1d76b644edeb396c887f75d2c401d60b04ebae9f79a4545218a525e10194f5fbf3161ef71be6"}, 0x10) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) gettid() bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 514.895555] tmpfs: No value for mount option 'ÔTv¦¿°G‹´¾ ' [ 514.934727] tmpfs: No value for mount option 'ÔTv¦¿°G‹´¾ ' 2018/03/29 10:48:24 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0/file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000005c0)={&(0x7f00000003c0)='./file1\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:25 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='tmpfs\x00', 0x10000, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={r2, &(0x7f0000000540)="9d63cdd6bfd538364c81205f94d8dde6f990d45198059f0cdd4412d93988894a1cac7da82871f500cd160d410aacdf7e1157582b67ab3e5588bfa184aa6af900eafc282c6b62033f2d4481b50dd38f833142bdc66f9e87874a834751d47dca19f668338c7b4ed7b690600543dd0dce924b63c2913f7c43ebf65422fab0158fb4a091534f8db249157d7e75841f2e43f022d12348271b"}, 0x10) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000780)=@sco={0x1f, {0x2, 0x8, 0x2, 0xffffffff, 0x7, 0x1}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000800)="6edf5455ea3a9ac9de022e1cae3ed3071bcd25ceb7ee913695d69a096afc9b399e97fa25e3f5ef97a3d8cd1bd9282e8918a4f042e4680adc3dbeb8ceac4bd801ffae60e58066b350fecbd0cd76d82010b9b0f94343b72021a496b58578678a89552d2bc1a2aa25235812d83fdea0a19dbad3d3c1c063d9f755ae3110170537b65f87", 0x82}, {&(0x7f00000008c0)="2973c62de04e7c312835485b0b605d8a8a1b5d654564846bfd1a05e5dcaff8278f0153f03886cc03214cbba43389255e7d20c43f3fc86f6726be5c7365f23b7fa228ca103b0a46ced4c70f735cf355eed69d59fd33f2772d0a707f0a57c43c884a20bcff4621930fe465fa5f369af39e2bbd5f424cfad8b6ebd4c9114d2ec6fa003e71db9ed59a03d64aff00a850e1e84ae62db0e7d51e1501d9418dbdd4475101c1ba6277993b0935550c6aa3ed59a9a12548f17c93421979dc9d2b46fcbed0f0b35efcaa", 0xc5}, {&(0x7f00000009c0)="096e57851044ef7edaca33c1d5ecd45d16ba6181b6ad1c7dd00218f0566e25b6151950457083e6017c5aa74931009d25b278672aebb967507be93259d9c56bbc721bc4e4b5c7b7e0d62dd4b11bb59fef01db922f4846078989f6ed1f9d928ae63978d1aa88161f6dbe972d88db3bbccd1ed79e17d59a9bbdb1d9cbf77acf9fcdb245338cefbec9b4ccbe1f6cb5068f2c417ee957c414ee47a57b88e76f7ab268fb4d39b46f2d28e885af6544652428a40e97fbcd776c5d34fb100d3f334ca2f187d01ab8a6175258b21beb42d4f7fa0010a1266afc4881b81de5d30124b4f35cb92218ee0eb3f596f8c6a0a7bb532318b144edfaaf13ad6a", 0xf8}, {&(0x7f0000000ac0)="6cbafedd4745aa5b0bb5f92d3e26f13ddfa4951d0955eff0c9daf3f09845681564fca0d81af10b548e689c83d3ea34bf944f852d082f2011b48ae3077d0be5724a3fed0acdb8ffdba6f14290aaa934e4f40e97987d3968bef3c5e464289c603ce025b0e7866c65dafba2e8f93f4bcc41160ec333480f5ea1025affb642e00f69bc51e1ed13fbacbf783bd1a86e5d7d14b3c34c2901b0e5b77ceaec76698ede3f854c4c0483c15576c74462257178d2c1d9ee2dd3fe1e6515531e911f2650778603557cebf12bc55a529f000191bbb21bd54c7efbbc0a17452c8d1e9852d1fbdbe6fc7dde3ec9d4d8b199", 0xea}], 0x4, 0x0, 0x0, 0x80}, 0x48014) mkdir(&(0x7f0000000740)='./file1\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000700)={&(0x7f00000006c0)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 515.631836] IPVS: ftp: loaded support on port[0] = 21 [ 515.658406] IPVS: ftp: loaded support on port[0] = 21 [ 515.694974] IPVS: ftp: loaded support on port[0] = 21 [ 516.842097] IPVS: ftp: loaded support on port[0] = 21 [ 516.868307] IPVS: ftp: loaded support on port[0] = 21 [ 516.897993] IPVS: ftp: loaded support on port[0] = 21 [ 516.936691] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:26 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file3\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:26 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:26 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:26 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:26 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000580)=r3, 0x4) 2018/03/29 10:48:27 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file1/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000003c0)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:27 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000540)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:27 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x3, 0x5, 0xde9, &(0x7f00000003c0)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000540)="273a9cbf42957d12501c1ec96e4f4bd21b4be74d1f901a479c030d0a7f47be2f75adb53743eb18a2ae4be87f276f9fde11516fbb742e465de7c51681f5c9f8e4b6ba8e7f015da3587dfba9eb3dce4b37cb35557fa654137283b13d6cc9ae51a4ed1203fdef67635066cad7d2b0520bd3a5", 0x71}, {&(0x7f00000005c0)="08c4eb8d9e354ae9381a555270cd32db3bbd1119c5b91903c6f8433d", 0x1c}], 0x2, &(0x7f0000000640)=[{0x88, 0x113, 0x65, "719a37f4a3194b18cb909f8f2c7650f1b530f83624efaccfe234b79b85180a6fde39c97b5bf09d3185f6a0f81f3612a11a052bf49fe22dce3bbe052405f24d32be708196db40b77c9cd8a1878959595f988a8e09cab57b3c85cea3aac9c618d99a90be9277919c4ea4f6f0cca43464cf7b9f43cfa9f93d"}], 0x88, 0x1}, 0x20000880) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) socketpair(0x5, 0xa, 0x9, &(0x7f0000000740)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:27 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f0000000800)="451f11a2a223a55e0c5ba3a297cd915401444f816e9172686ba770f07f3a59a9b6dfb4b3021326df625df43b28732c040a1bef6b46c4297d41195e5252512f68730452a007a81e83495fcef3bf91fb9267211e24ca6924654b328f5412fcc2d06e0ddf26adba50194fda0c72a9233aae5aa4bb3a1d439a0ca24aecec21a0170a195a0e274eadbda833b526c416e4167a793d1c1d451a5f7aa07fadaede1568ba", &(0x7f00000008c0)="6951a1de81dc0fbba1aafcb8a65cbb604b11cc6d7693cee4ba568467de0ba53713017d915eb9d3edeadf6032a3144e11fc57c8894af556f13d3808f82ab47329843846997d7c335876863a71fc97a22defe4e1414048bfc82ae615c2d1b84363ef03b3c1ec47f3f2a9ae88c4df3cbeadf8caa822add890d58adff88a6f257ae77265cec8c008a2f01b9fca43b1f7b6852363e792fc407a65fed7260d80db9588584ec094e5a233cd274914fd9d169f21785bcda81a904a7ec80f72e3760ab053f00e7ffaacfaffdfe9fdfaecb2a90db9b45fb3996d209d22d0b05be65e6ae35daf63e7d4600ad099bcc90704b6b427"}, 0x20) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x2781) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000540)="3a0ff061ef0741a15feb6cddb0738caaa635867df6f838daf42e1a77be9a712c0f587c5a12913531959fa1fd679adc829da8ecc0b220450768ee1a173828d1d65cc8ccb30104000000000000f3af8d5f022f652fc8151aba683b1c70ca24aa9a5be074158676c27a5578dea64b7b53e926cc258021bb4bdb9380da03616df34b8d9427efc7c00d6ea44a36cc530192476edf6ba778b9e0947cc89240edc5d5c8175f919b59c3fde862e9f531de50b66a80930c6b479c1e8efb451a9dcae53c87863c829d1bfc9ef321be5da7d70a0f2c148bc854aac144d381", &(0x7f0000000300)=""/18}, 0x18) socketpair(0x3, 0x2, 0x7f, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000007c0)={&(0x7f0000000780)='./file1/file0\x00', r1}, 0xfffffffffffffe5e) r2 = gettid() perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x0, 0xf, 0x8, 0x3, 0x0, 0x8, 0x400, 0x4, 0x1, 0x7fff, 0x9, 0x10001, 0x7, 0x7, 0x7fff, 0x2, 0x0, 0x558, 0x5, 0x800, 0x8, 0x80, 0x3, 0xffffffffffffffff, 0xec, 0x7, 0x5, 0x6, 0x40000, 0x1, 0x0, 0xffffffff80000000, 0xffffffffffffffff, 0x6a7e6f48, 0x10001, 0x5, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000640), 0x4}, 0x20000, 0x7f, 0xbf95, 0x2, 0x2, 0x20, 0x8}, r2, 0xe, r0, 0x1) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 517.978279] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:27 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) mkdir(&(0x7f0000000580)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x1cb, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r1, 0x28, &(0x7f00000003c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000640), &(0x7f0000000680)=""/18}, 0x17) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)={&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file1/file0\x00', r2}, 0xfd7e) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 519.017271] IPVS: ftp: loaded support on port[0] = 21 [ 519.042955] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:28 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 519.072924] IPVS: ftp: loaded support on port[0] = 21 [ 519.114639] IPVS: ftp: loaded support on port[0] = 21 [ 519.168765] IPVS: ftp: loaded support on port[0] = 21 [ 519.208391] IPVS: ftp: loaded support on port[0] = 21 [ 519.255214] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:28 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:28 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:28 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:28 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:29 executing program 3: mount(&(0x7f00000005c0)='./file1/file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f00000003c0)='nilfs2\x00', 0x44, &(0x7f0000000600)="902e7b6d3d2c4b97fd76cd19e94c29b160c266a32860fa0509bd0f99abe94b4beeac2553496e19f4367c6a8405a46280f1de21898a0db386704b78000bb84d0c4b31d59e41238b9e7567b2453fc4f0e770cd46b3d0") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:29 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000003c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) getpid() mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:29 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mkdir(&(0x7f00000003c0)='./file0/file0\x00', 0x80) 2018/03/29 10:48:29 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r0, 0x28, &(0x7f00000003c0)}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:29 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000017c0)={&(0x7f0000000540)=@nfc, 0x80, &(0x7f0000001680)=[{&(0x7f00000005c0)=""/1, 0x1}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/75, 0x4b}], 0x3, &(0x7f00000016c0)=""/246, 0xf6, 0x80}, 0x40000002) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r0, 0x28, &(0x7f0000001800)}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 520.130806] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:29 executing program 6: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 521.440995] IPVS: ftp: loaded support on port[0] = 21 [ 521.467673] IPVS: ftp: loaded support on port[0] = 21 [ 521.501092] IPVS: ftp: loaded support on port[0] = 21 [ 521.529355] IPVS: ftp: loaded support on port[0] = 21 [ 521.570647] IPVS: ftp: loaded support on port[0] = 21 [ 521.619410] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:31 executing program 6: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:31 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000003c0)) mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:31 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:31 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:31 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000003c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:31 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000003c0)='\x00') 2018/03/29 10:48:31 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x140) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r0, 0x28, &(0x7f00000003c0)}, 0x10) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r1, &(0x7f0000000700)="8e63523d85f70d9f"}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000006c0)={r1, &(0x7f0000000580)="42a27383a60eeabfedaf7667bd6f4e58238955cbcdc23a1fa128a24afbc776969acafeb13db5b76ac4e4913fec8cd2f47bee8cda2b16f7e73a2e48585f3a7d1d865b1a71b53254aa9b84bd104b5511474b778c96c78f49763d40e8452de5a4324c67a3dd7928ab650f450a10875dfd72e025c1e383b3c5b238a15c07fa50b3fe5b1e6c592e056b45f1cc6f753e7010af39c8c4cebdafbe033a1813420f2a3b90d58fc8f932ea13bf87c5d7bf739819922358e879cd91e91987c16191", &(0x7f0000000640)=""/66}, 0x18) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:32 executing program 3: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)={&(0x7f0000000580)='./file1\x00', 0x0, 0x10}, 0x10) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x50, &(0x7f0000000600)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000006c0)=r1, 0x4) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000940)={&(0x7f0000000700)='./file1/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r2, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000980)="ebaae659f5df5e01c4e3a0b8500290cf072b96c2e36ca8c0c1a8e378b7956004a3c5c5893360fb42d2550c5e8c3628d5a103940063f755e85288fa633d2e5bee5c15c807c29a2b5fe33b081a26c8426ea56f087fa3f4c1c3caa67872b90473bd49bd62feabf6f11a2db1fa1aad63a3c26ee303c950dd9ec97781a7c974b939de3d28028c6ba1dfeb4b3d318a765e36758a7b86ff3104b97e44f440c114aebfbcac1dd368dd2e0bcd868dbc17ceda", 0xae}, {&(0x7f0000000a40)="d5dced9645af5f815b1675546be5a4b9947d9470a8cce0a5e63414bb1dead07d9bcbe7fe155fece16a360762682f8ed6db423cdfbc36c54805f3f0ce41607191577c82e0b70da2e3c29f3d1f16aee45a3d104d499a24c7df13da45f7065d73b1efd3f0133e9a12ab6867c119e1fc68a015123b1d1fe0df88e6828c662b7d4899a5ffccc0d9e65f57613eaf3b63f77c19a11179d37074a68eb01756b713fc3295066f57d731fd2b00efab353b043988", 0xaf}, {&(0x7f0000000540)="7c2e7b18bc87e51bb31f4504a31efb7fab4f1740f38bd907a109587b6e0f03b20630a0dc100e2a6278e60a072839426da17b4012", 0x34}], 0x3, &(0x7f0000000b40)=[{0x28, 0x101, 0x400, "8b780056c6c90a9774d18e655ca542c071a0466f"}, {0x50, 0x107, 0xfffffffffffffff7, "a11f56e7c73bca69ee4f556f82e944420d5e649c4556f1aab1eb81b7d8fff9989c489662cebb24250e7cb59c92c09c5aa447fdae4df0d02399f4"}], 0x78, 0x1}, 0x4000000) recvmsg(r4, &(0x7f0000001c00)={&(0x7f0000000780)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000800)=""/166, 0xa6}, {&(0x7f00000008c0)=""/57, 0x39}, {&(0x7f0000000900)=""/18, 0x12}, {&(0x7f0000001c40)=""/4096, 0x1000}, {&(0x7f0000001940)=""/88, 0x58}, {&(0x7f00000019c0)=""/203, 0xcb}], 0x6, &(0x7f0000001b40)=""/187, 0xfffffffffffffebf, 0x8}, 0x40000000) bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000180)='./file1\x00', 0x0, 0x8}, 0x10) [ 522.488110] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:32 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000008e80)={&(0x7f0000007900)=@can={0x0, 0x0}, 0x80, &(0x7f0000008e00)=[{&(0x7f0000007980)=""/217, 0xd9}, {&(0x7f0000007a80)=""/217, 0xd9}, {&(0x7f0000007b80)=""/136, 0x88}, {&(0x7f0000007c40)=""/136, 0x88}, {&(0x7f0000007d00)=""/4096, 0x1000}, {&(0x7f0000008d00)=""/240, 0xf0}], 0x6, 0x0, 0x0, 0xfffffffffffff768}, 0x40000000) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file1/file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001840)={r1, &(0x7f0000000740)="ec790f56dafc9fc1743eea4b45b6bcb662bee7c5853fda1486180d6d7c1833fd890773c878cb88370acdfdc36b3bf52342a2772826cd5531a91a05d66c683e36347167a3737bb6bee78635353b468041a4d8e4218a37667e7033e3dcf6af3443c497f7d88209f85669cc242c3bf67d609438d4931adc2d29522ccd080b38bec0c60abdf8cf524d5a64c807b02fd31d2f34140c3e4ffa3d2fca61595f0617b036fd8a7be40319e456ba729ef4cc89c64555cb5308a4c75d251efcc501462cc795c45e00f1d4c14da0e6c835658dacfd8722fb04729849333b8b155fe06aa452893b44eab898b974b0", &(0x7f0000000840)=""/4096}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000008ec0)={0xf, 0xe, &(0x7f0000000580)=@raw=[@alu={0x7, 0x7fff, 0x8, 0x0, 0x9, 0xfffffff4, 0xffffffffffffffff}, @ldst={0x3, 0x0, 0x6, 0x9, 0x1, 0x0, 0xffffffffffffffff}, @ldst={0x1, 0x3, 0x3, 0xa, 0x5, 0x32, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x81, 0x7, 0xf, 0x7, 0xfffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x3}, @ldst={0x3, 0x3, 0x7, 0x6, 0xf, 0xfffffffc, 0x1}], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x57, &(0x7f0000000640)=""/87, 0x41100, 0x89c1d05b2bd1f2e8, [], r0}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r2, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000700)={&(0x7f00000006c0)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:32 executing program 6: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:32 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:32 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 523.754057] IPVS: ftp: loaded support on port[0] = 21 [ 523.780802] IPVS: ftp: loaded support on port[0] = 21 [ 523.814046] IPVS: ftp: loaded support on port[0] = 21 [ 523.847792] IPVS: ftp: loaded support on port[0] = 21 [ 523.893289] IPVS: ftp: loaded support on port[0] = 21 [ 523.925558] IPVS: ftp: loaded support on port[0] = 21 [ 523.977496] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:33 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:33 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000540)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000003c0)={0x3, 0x0, [0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000540)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:33 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e3") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:33 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:34 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x400000002, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0/file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000005c0)={&(0x7f00000003c0)='./file1/file0\x00', r1}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:34 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:34 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:34 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000003c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:34 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000003c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:34 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socketpair$inet6(0xa, 0xa, 0x4, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000680)={&(0x7f0000000540)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f0000000600)=[{&(0x7f00000005c0)=""/36, 0x24}], 0x1, &(0x7f0000000640)=""/16, 0x10, 0x2}, 0x2020) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f00000006c0)='./file0/file0\x00', r2}, 0xfffffefd) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:34 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001700)={&(0x7f00000016c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001680)={r0, &(0x7f0000001600)="044eb4e2b3c0a2ffe3cbb132cc0339119b289eeb5dc8a6ef65ae896523221745213be9a274b633", &(0x7f0000001640)="a48cdd254256025d5383", 0x3}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r1, &(0x7f0000000540)="cb81578affbf7f4b79a8a60fbad78689aa6faced25b4714fb60cc33bf68b3c1a8363fc7ed6e86192cd42f2f93a7aa7310bd5b6265a3b3aa13a67e6cbed66394adb725e783743d34b634cd57f8b062d3f98c8371f43039e87605046c2b23c13eb67060de22a2b17f24a6b6306f8e115d2b23bf189727561089fe497bea7d22171902f13dc326ac3e0ab9eb88260f1a3b866333eb53638db56c9", &(0x7f0000000600)=""/4096}, 0x18) 2018/03/29 10:48:34 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000003c0)) [ 526.091903] IPVS: ftp: loaded support on port[0] = 21 [ 526.118898] IPVS: ftp: loaded support on port[0] = 21 [ 526.146824] IPVS: ftp: loaded support on port[0] = 21 [ 526.185454] IPVS: ftp: loaded support on port[0] = 21 [ 526.237742] IPVS: ftp: loaded support on port[0] = 21 [ 526.277392] IPVS: ftp: loaded support on port[0] = 21 [ 526.319474] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:36 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:36 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000000)='./file1\x00'}, 0xfee3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000380)="49ea7270e3706566732c", 0x80000000, &(0x7f0000000300)) 2018/03/29 10:48:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:36 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e3") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:36 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:36 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:36 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x0, 0x80000, 0x7fffffff, &(0x7f0000001180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet(0x2, 0x2, 0x9de, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000bc0)={r2}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg(r4, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0)=[{0x1010, 0x102, 0x7, "195509abf85ce89ee6999d6e4ea03b29a58134affd61b43f6ac38966d2e156220707e1dcb9172b41d08d6e8a41254016c1e46a281f72c420dd3cef9d1e53629ce57cfe7351cee80b0887b09e417b552485f26fad793133fbad444640616e2654962cf1bb6b9db9fb7c3ea6910287bb690b767bff9bf36e08b5a2529deb56ac2081caf8ff30e4c68484cf36b88264f0d6125abb4504cbab202a26d639b7d5b5821432804810ba6ad006910de179d8bd8f6d0eef78cd6b23bfc02da2118b558b057b0897e46574338164d31dfc09c8ee298ff03f7108cadae49d0e268ccb109ad4fcc5e747fc1d4fb717fa2bc159cce5be143af89cd9cac3f040a6a1d9799068731a091693ebdbc3a84247d36dfe57593685666bed62505b04061d78529cdbe4ce2e336cc26a9c304af70f5b7290f4a301cbc13063b82683209f3f6335b266a40e33647fef58e736115a7d32d2782c8a451518aff73e80e1dd174d9eca9b03cfa8f26b1d377823ec93777bf0df8b2d3cca6bd2e4367266249275f419640bfe7aa34beac544e947f557c9f62f8bfd1e3dfd9887fe9feb9209f558a8d25c9a057bb648ad3e07fd8a2125829fb9fe24c99bd3b56873ccbad15ef5b7a4e1068b0dd5cb0b487f0be076ee2069930d7b3425c588fc4651518770869f0fdb51b228739e9781ad4ac3d2e900754f4e8c5d1462adf62a7731465df9b66bfa41c6154626e58c629dc93c2fc86f46a5872d8e83d652f063e3e71546d748e131928b32c7c9205991a6f635135b81973d993dde027fe3e3e5fa794b4b4ff54c5b83042dbf105f01293e5be90074ab2e1df3473db03a54b6baa203e916615e41de302cd3be1622a49a1ec3a753261ec876b5bbec6bd72d742a261b1b992d63565701e2c3c1e15043d14daf9d4e9da8f520e47f5b894c153c88b513e5b6ad68d393b9934ddf5fba237a96fb4f6dd39e127d084614d8f02900a8b85ab7393185ce69c8df1b6c4a1d32ffa623de6974ccdb335e36e48e4776e14187481aff4f7ea3c2bb31f9d2e1454652f44681364ef40b6e4694d3161849b0f13df24e8e7e0a2b9c26874333c9e4c228aabf4201c7c9bcfc08233fee04b5539b511697a853882f744899b9e30edbcdf8fbc84d897a58adb54e8e94fab6f3af49d117fe00ed401fa6642608ee9c54e0a9cd4276699b070d4686455ef9a5cf733b21db34b3c465ebd5bfccc0cd18ae6fbfd136efc4da09a089b29d2b2a184ca70a060c26f8af2b24e5ee0857c74fa55ca797e985b7c9775a65b27373b865e31b0502b167c4d2be4834841932c12e5a48a007a56bccedbec251c68b0c796aa4cf3b298d3acf4fb0b55f1bd2e217a7981c6cc6efd3db25c4fd4a5aa86b49a8148904e3dd95458e0742cf4dc241e309eac1cb07cb3162f4a64899f1462e1710dedece5193311440444cb341a32ed992ce925d3044f0d9b0a48cca5524ac0dce9d9a2a9c777a1360bd8161de0eae4dc3cfc09b1a5df70d9773f1c381c4cddea996d7144a4d50bd101968880700b608984d755d9494eae80163906d32c13b6a9c937e57db149f6f1f07014f0c9c8b84df323110055e0bfd220a0a73034d4f9620081253a7e67cc60cbc3b3314e464f44a71de4e003c2081794769be22cd0ad6aa338b5621e235d5ad15d2de6ae0328317660c5a60ebb1dc6f01db3b7bc1c96d16e515eba4f0bbcd2b2f9cf27e9a4a229c0e3feeffd1e161ed17276a1a083eb9451bc34287e188003f7c1cfe2d1e694d99ece6d7b3812b33ee8327264fa84c8df8457377dfed82dfcac83a012d3f268ed1335874c9a00104b252c255f9557b1e0392774ab8e77d215f7f0e55aa7190f62b019c404e7be0efe03bf0df97c39df6c3a41147e4355c468b3b36adf47b96ae24efe9cc5acb839eb21b88af1cdb17cf52493eb250e32369f22cffb6f475f4054f5ebb29171d166738dc0309724c8a8f3a32cd83279c075f85517f530dbc315e72ee010d1bf470f61eb97189c2a9de1ae8fabbaf66ff3c0dc298edcde52bbba62a8adc5898974bd0dcba5b5923c8dad8528aa22e35959e76415bd69a083c8fe21b85a4e62193b596d7ccb84e8fa9c4626f431845fb25c9908c12fd157272cf8d5fa2c25a2b0d99517899e1cf71a0d6ce31b4f1e9881a45fef137b8ab4082697be841e57b1c4aba709d8d19018d39b99032a16e8102037050b568b1dd28db6d22b71fff3e3a8bc3a2e65cca69fd15ba390bb4057f1ee4c06ef6220b3ea2d9a6a6e085701813159851edd4d428f32292a68d02be3a5f8ce0c4e3ffcfc9524bb4a99ee4a76ef740bcd40d7ff655daa083c3a2e98957a092317624ba3ee218209a4e5efacee8e01ea99ed377150017db9bdaf44a034b5a6bb280108742798a79b277685d584f4450e83e7152051f8f2096583aa9e2b76d38066bd7de0968f6ae4db90a849ba78c4192c1814ccfdae858d2afeb2dd84ccc9e59c15212ffcd33f49e0fd44d9219811ba642d7f6d120e27d487ac0eaf8e43d60e246674b774bafa423ed353d0f52d43af6b5ffcd73346d09ef7f60fd2d8a6bd818e59f3a7f979bd75b559f72906d52e4655e68dcd3cce66695b23e7b62861fc28c021e035bf78766635325f28cb8004a18aff21d485be6ef679feb54fc4f0696f4621927d502671ab064d9e57787db61919316a555c81ece6ab83c162f5f5674621b531bd4a1c66b97aec43e2ad8d3808111b21599d5a6b6165ef27042b31e3d6435d90924097bad8ac0c9de165e17de0a659c98365e54a24804c0a610a83267badb6a7108fa958325e6b6f5d2fad5839f3f47dbe77cb5803e87ecd807c24393a01813009fdd9719b6459eec3bf4413c95787bc49cc276110f86098ffdf818be2968dbc4c4b64b9e2473059c43917b8931bf00c2a59a14897c7678d86c45e773b03810d6687b70fcec0b0505e34f1d216eefb157890f40603aca99b7b78b921c74f27165f2453eb5f3f45501d68e93b814059c00d2cd985d35940817db14d346480ae7aac989dd506a4fe1d1cf199ac00692ef3228623b20abe30648677a8b4cb146fbc8837da48bf121d73c5469eb1a1748781e84d1b680a5a363cabe48bc93ef7733bd533caf4c5cf7e3638856c8b68e5109ae31182c0e5417c2881976eaf8a2ee656b6189aa094ce7e9671507e8ef3cc75a61c6e39b1847c8cf404d728c06fac4f985be009c4fce9d82bbc0e8e0ed3273902801b6b832f3ab8fa1379560f4bda5ffbd3d263b298977e462df414800fc9abbe0e453d7e2f75e1ce854b0c982f4089d0a2b9b49624387fa137ff9867a353184e0b050d443acd738dd51b0ed77e2c001b124bc04de6f0e182bd039a6395e4ce84285d5c28730b4de4de513ef76ff7b50134c8171bc4b6bd2176aaf4fcafb47d75ade3793cdd0cb4d0e5b3bf1b3a5a5cc6fc9c43a96764a5696b5ba5ef0aa1923ce9569e4393e2f9c39c2732c771d364bd3150c3819d4cb95ef83bf93d543e1957c193a2b16ec484ce0b38eecbc19a779deb09932dd732efd3a0ff4d77b8bb993ba34805714c188fd18c76c7c4a0b8fe32e028d4f33c70c07fa1920f30d17acd9935b64b6b3adc10dc46ede2545220b7db4317d6442f2bd89a5ff4f746a5a593e361c92c8832d4a1ef50a12a902dc660cc3db79d6fdc9ad53efe22a3469c13ce48586e01b87e9305f02d6c38d2693483124bd47698a884ac374d293ed82f05d859d739bce1365799e1523e9f7cfa23911acf9d174e6fb355122df619d2035003ef5ae610aee32c4433e5c5223ff020c1e40d64e337fd8d5d0305d795c5fa257fd567f0a24746110020d2148d6d2e21b7e1614d41fd82e933173c8562c407cb9361da0ad6a6eaddce270035605dbdf2a8c5e05f68a9666cd191bfa4e4ff34f08daa241ebbaddc1797664b49b4088c287821738d80b493699c45182b287939383ad6800b80df4d62ad6c543d6b4e2854a6a2dcf0bb013ab9125961b3794b4972bb9aecc5e8bb959b545a21ce9471759bfc59fbfc69b156a16b134fcf301e5ca36c7d2a777921ec598eea1616e302e2dbbc2a2852330ea246bec1febb7b0bf9a237032db767a5d3518ebfb0a3287aa28f01bc2c4aec4588b49db7d576ceaf46a5d1af5ffd0b46b45181da6d2a8e39229d20a6990f8c34e752dd8c337e3cc583187edce90aa91e05611b322e14af13f20a309221383e89483793bd247c881351fcb5d04ebd75c4f8c0de11687b7cd2cbccdcd839f126ab6d97ff34c2052210123b6856a9598c35a61b3db7556eb01f5981c78a3667b82302717102c1f128ceba2e55618811c124a79d3d287c5ae2aa4c9df57c37439d2e1bf6b195985d6abf8c41ac78367fb229d5cf772d82507f4ad5b100a6948ff3bffe757ef5597f365d2d1ed7af92016da5c9d682f79a0793e0c75ae65c960f6aa592acc9307c2547c47da074e1e063cd7ddac32305bfe11fcd2ca17d8a2af40b86c1abfbeeb4b7e9de104662637548d32f2a2aa3ee68f016fc65a7621f66fd6cd7d199807ffd00611a4ce0d57914aac7fac7ed42fae86c40960a162abaa16fa351a2b1a8585b5cfcde19da5417dbee2974d0d218f5fbc3e98246f307857d560be5784de2fc07724d7022cfac27be4aa009c7a1dbe509e4452240d41f65bb9c9189c3031e439efb34ba34c9672f7ad8bf0e44129253274f5e56f0621fc6aeca0f441deaa469bdef2eea75d00fdf871dea780bea2dc1db08bb28a235079cc7af291886a75136c2674fb43b636b24b5502ddfc785ebca3f0d87c275a5404b2d22c6011f562b9b12b270cd190231666826eeb80840092d6dd7737029245341e29b74f836fd1c84c9292c593fd83c6a5003bf912215f61dad49296f6a1ca06e5fdefa29d0854de3bd991e73afd2249c86d02f49316073a686e00353f5f91afddb47a97a4186af31b653683a4841195872090576b3217168fb73d7af5d1b868052c823a2297e99fe6cca73203818926772789cb036fa28402695bb600d536645374a7f876ca53e0f6336b9c83abfa1087064baa6eade353c684e0f26c4756b8867b961f735d7dfc6cfaf62b043a6425e74249ef814ebfc1cd52ab1eaa742a839c0bdb958100b2effc70d18cd541a8bb0f653e4df23c46eb6a582869935f2fd919c7d8330514898adbb67dc31f0db06c85cfe576d9e4c8ea7e5f56cbd5b0e7e78b9f5550abec9d5918ac8870fb1d5ac89c1a4b54ab7be1aaed54874021a407ed0ea43c3ae16911b4f8ce396567e31bc326fcd84c400537cd7fb4179d5ce862eca9bf185c1f60a90ffdbdea480f46aeafb5198c5843d649c6f22c62094ebc5cb445c7d9fd722af002610e541e7e5cf8efbd935e75ddcdd6cf2fe73b6d8d79a380954ef506e59c76a154097aff840e2dc8ae00f354774afa0166ba3dcc3ee657a527823b65d5893369099551c28f1188d3766812e42d95ecdcb9ab921b9a34b2bbfb4800a0745f7e8039f129ae4aa537a667470c780f9ebe028d40c2f69917380475d97dda7d24207fda1da3ccb52ad22787a4b7bc742f39bbffd19becca40091b5925c42655832a63c9704efd29d6ade0586a46d50e4dc8ba0aa35f13934c9727438fabd4be218e4ed0614fcaf757575343118239b33f25b5a5d14b60bfbce8cd96525cea42a3bee8f9a7c1e82d80fec86e18ab99e01ff37fed75f5ecdb557bcdd86c690fc7159e955884f1f607d18302b581c0ec1fd18bcad6f3a44ac04862ddedac35fc7d31ab12a9c0ce766bb0c36cee9743881cedd7df0f553eb95f15bd0a7c2997986ce23e15679d"}, {0x40, 0x13f, 0x8, "c6c05e2b5ecd9c6d2c06f462e8c5fcd49cfa9d4e000ec572240981db6fb6a83041c9a68c9ead04c2a69fb5"}], 0x1050, 0x4000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x4, &(0x7f0000001800)=@raw=[@jmp={0x5, 0x401, 0x4, 0x2, 0x8, 0x0, 0xfffffffffffffffc}, @exit={0x95}], &(0x7f0000001840)='syzkaller\x00', 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) sendmsg(r0, &(0x7f0000001140)={&(0x7f0000000540)=@nfc_llcp={0x27, 0x1, 0x0, 0x4, 0x81, 0x3ff, "bae163d13c6fa2fd0ad314cf5584431e494d08d41813271d8818baa69e3e5e2e7ac06a277119228476fd99e41e0e503bfb4bbf0389efa6c6ea70cbc9778533", 0x1e}, 0x80, &(0x7f0000000cc0)=[{&(0x7f00000005c0)="b71aedeca431594a3456b751076af6a7f8252191a4071629e0eeab255ccda34430d31b281686f4aef7cf8a18d82ff31271fb78067cf00659e52de84a29eff92aa80a8849e61fc07901ef72254f9d258317e98559305c96fb375ec6682882e1edc20481e6c48b0256aa0c576fbcb5fe19e1ed38629716271566952359909a71a2021904425aea1c7ebdc713cc8c63cc50cbe69142cbeda5413f62becaf3a5582c2565ce", 0xa3}, {&(0x7f0000000680)="3bce8db203f1649dd5330fa86633077a65821d6160fa609aa5c89a2fe02c613012d10e0395382d567d4aa9b7cb851c2cf9c54f1570525688fac6e8bf88fb8658d00a61678c5b93c65c76ea2b6562476d84327353406cfbec2c635dfa767b6f5555aa755deb06d5b4c02e868b3e51493039cfbb3752161d2c4b6cf61e249c61e95ddb77618cb609f7627a0885bd36205b10a8877048eb766f0f01d4f06c7e5e2c62109809d48152f206aa1423ce8b4f23212d06febc7872135aeadd5ea63f85334ecbb3c6ec4a1f7bc03f2e31e1741116b83eeeb22c74bf3fe8facaf81ce9d0def13dd5b337156c43006cf5a0", 0xec}, {&(0x7f0000000780)="7715ae379ba12c0aedb618ee79bca0b3f15af03da274da484eb2a6edb57c0054a421e8aa9f43e757bf97c950e6fc2f8bebb6588844f557a3bf52b0a2b35fd972de5f6bccfa9a6ed15538f40b1c50929065de430c101a95f894a8bc3d16e4513945ca720dac4b2c4499082e32bbaca1b0b3ed587bce8d083c5940266aa0d0f473508b2d1f6557c1bc434556bd385a9f0ea6", 0x91}, {&(0x7f0000000840)="58190940272e315469f50ed8cb3aa0478b5537ccb4282219e6f0051ea1552fab4ba3d22f4b756615d6ec45bb35f6e45f69f8418b0538b118a9622f11ba2f807d6c625cb50e80dc0a01e2028037e48c4a78aba17112a7ed1f0570014c0a8a970b6636bd3c444cef32fa6cc6712365c1e44a2303", 0x73}, {&(0x7f00000008c0)="3e5c3d2a14ff29eb7896d527398b14515a8adc9b056241f9e34df0ec75003b4371d09394b0bafee6182f243f54ac9a57147496e332d434912302dd6eeed918b0335ac453a4cd641cccc97ce989c1ae3b5db80545d702e1d45b5384844c72d860eb3a00e8637cb396258098ffc0af3c91e26e3b3ddb22e0a82a196f76dc2e8769d6ff", 0x82}, {&(0x7f0000000980)="9a80fc56a3625c3c22fb8fef13c08f007503e0bc3a9f93c36e8a5c97af29f73c287d0a5f240baaa9f2e192607a849903115567660ed9611f9ee43e2a38a1ca72d062c12a8b4b8fd5c7e34861b9f9e09e35a1815beb695039a4b573d33bcc49001f079fe2214167c1da38587b090967288b2d386c669a4092d67ea9b3b45cf107ebd844d04fc8d27d53f884ee754507524ee38a780e99c4dc26f5038665b475bafaaca2c62d3219a3b2614b5bbf3210c2c5922e10fdd16e12f180205a96fc6f61dc", 0xc1}, {&(0x7f0000000a80)="056f143fb32126ef85f433c6b9f3465edc317a00178bb6cc9bf175a77e0177b5d22e4c9026f926bb26129228b56563d057b80d2b3843a807fc28abbf223a0aaecc5e83a1b46b34d246bc87a1bc2174f3dbb60e2f57d791cce42708ccab500793459b7daca3dd0382f03f6c670e207ab65029971957f41f262c69a8b654b0b3051b5367542faca720986b5f0c6a43c5d511b5b86bf52d88a08ba610b618f9d5af28285fc16943e4dca1058f353e0ff8d3da8269ccbdf8a7ed809e22f057", 0xbd}, {&(0x7f0000000c00)="ce8d9c12e6e46506ca1e19ca32dd4da60e3ab4af31cabedffdbca08def6982609ebaf98c052738dc0484636fb658bc7ae4865377aac5452474f248df3880c4129cb8a70937a4d02ec56c4ac8f7db274d7223c7545f62b6bda82ee2325edbb91d31d67307a239a29f082626ce11ade1437199201e380626346a2df6a627d86f634ae987dc4c7fe5deff1b71bf8ff2f66f9cd1ce3cf28f8d84e506a180da468a8590bfa432f8b91885cc2a", 0xaa}, {&(0x7f00000003c0)="4da3ae32dbef991f01f816b6636e2a3f55ca8bd411dcd1c297da0731b0089ba4e69277905b3035c3dd315e3310", 0x2d}], 0x9, &(0x7f0000000d80)=[{0xa0, 0x10a, 0xff, "f0bc77b34b35112c1bd991eac7bc222ff39f7b8ccafdcc5dbb1a57f7e52d12bf9f8b076705372602ad9510dd66fd3185c8a43103c0e33d033f0ed199864484f8ae0640b7b5802c240b03bb8a234ac5a9dcabb03f50ac70d65f5c5c05c8ba3884fe9ea07dfcaf07c3adfc7e0253e89c0e237ae179c93bd0e2b46c1dc1eb99d1b35a3aac1e73e984adbf44954070"}, {0x20, 0x118, 0x100, "59830a9ecb3ac2eb67728f2a"}, {0xd0, 0x10e, 0x2, "f5ef3e0006389618e1206b42b4740be60def14b57d0ad93a673ace8ce961c23aa549836fe421bea044ab4f1b64050a3b2a45fb1fd2dc760052f5ba2d5c2bc9e9fcfbda820f2ed9b45bc7209d255cbab4d6774966317acc7f3931411bde1bd287a36acc1fbda19fbb18e16133af1e2c6774600033768fbbf8320cecd8726a818ffe8407dfc5b77010bb8cd7b5b2b16344bb2ddd2de93d9c62cc4e80c915208752f139b1814f92e6c86c9825f9ba2be4e9e5b4088eb94db5cf85eb"}, {0x100, 0x11f, 0x3, "1f3ea0ec07356d7c8a1a143acc0114ed98fb43fb191d89c3a6d2711d64909358f74cab6253060d5dfe8fcc765e1ca4332a89dc91f345863d095d1675000710db64d70997872dff07561b51f299c06dc573835f0fbd48b9b4d73c604670a5d15eabec0b9843f3ebbdbfd4c9dddfec23770b478cb1f28c938cfe252973306c2f8affd31c282b651e7845b2a5367be1b8822a9f99434dbe8f39f62bf6a66605ce4b371b4c5a7fbbc7ab9ec0047f5c8251ebe73fcc09bb8f940f9eb84b696c77b696e4bafb4efc97c1e94e3b4426d98c398fcd5315f74e046811e3e62722ec8c103de1d511837339c0e58d949a"}, {0xa0, 0x13f, 0x9, "a4f3a00c14a8a80a4518b29be3a69a262b1c0c815417bc33532476c7efb4cb7d59f01845c095a646f059df80ff582c5a5c2d16f5151397d310adccd8865e0ac8e722d991203bc854737a364c6753a1e343d1184efafea5b0596187115a342a7e09aa03ed00bd3a4f3e3cbf2ff271b4d776c3d531f9cbe07e7c1ed69045023881fd300caca50e9249e4e6"}, {0x70, 0x6, 0xc1, "98debeb45fda8515950391c0ffa794757be7f1184380baae90720445dd39e5bb1c82d824718387290ba4286ed9654e03cc6773a987847859d7f49919dae291648c49920de50df1082af3ecb2383840005b9b676982aedd18eb29c5cb97bd9f"}], 0x3a0, 0x8090}, 0x40000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:36 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000a00)='./file1/file0\x00', 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000ac0)='./file1/file0\x00', 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000940)={&(0x7f0000000540)=@nl=@proc={0x10, 0x0, 0x25dfdbfc}, 0x80, &(0x7f00000008c0)=[{&(0x7f00000005c0)="ab4523ed7ee3e353252d01c86d4ce1af1e4fa7976229bad81a65fd801935add1078d9aaef4150a42ff21cc3686d8c2b266907f26eac4eefa4d8e47c8b1b4991ee5d0ef15aad34a8238d84d7b345ba9e7e039c28c24d8ca2881299653603710caa66bc84a42bcd3c178d65a458819fb413f60f36f744396bef661b3159d5aad12f14155e3415a7578533e0267444a40a523aa8b8d7a2dc5300ac67b15c9", 0x9d}, {&(0x7f0000000680)="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", 0xfd}, {&(0x7f0000000780)="0d15d71d756c0bf74c9bc050c9b397c7940ae45c53cc6f285a9e4bf7c1158a8fbc1f2eacabdc53caa841af23ce5ab8633846ede42f08abf70988bc748c0eac69fd29a7f93f2613c2662adee599a1b4a88f020b9861eed83355d4dd22898268f5ddb894db60c155ebe7ffb294714935579f792de150b8292c2c7697731930cb81e221a82ceb8fbf34c1c7369b27809e66101980093b60262825fed4ec7f7e19c2ca904fea63537a7f78797a659ee16d066c105fbdef84b0fea2c9", 0xba}, {&(0x7f0000000840)="e1aa8f27a850f88792e4783eef525804009ec6b740a610848daf821b0c9ffcfe88a1d6c91a6177f6759ba7a9f8362bda16b1d4eb7e52a410604a5d0ec8f2ab161947912dc5e981ef07a9627d02ce0cf5c1e412e8a2ed4f99aa9a44d520cec4", 0x5f}], 0x4, &(0x7f0000000900), 0x0, 0x20000045}, 0x4000000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r3, 0x0, 0x14, 0x51, &(0x7f0000000900)="f53809bb1482d4af0e2d4e9b2e7e312ff172331b", &(0x7f0000000980)=""/81, 0x5, 0xd}, 0x28) 2018/03/29 10:48:36 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000003c0)="8af2be5216fb945efe17f77ead392fd4d566d619f3417463c9bab20e4b4cbb884673892fee295f5236df298f", 0xfffffffffffffffe, &(0x7f0000000540)="97769aa97fe49cf20aceca6c21d64cf8bf734492ed021b3e464bbf4cf6b29fa265171a996135e0ba3beec40658f0393fcc12b917751c87d1faf1f95417a276751a8b6603e53e499e91b1a174b2c1bb0c922a9abcc4a29b122ecdbc31b6860cf8987d314767d7786ec241b3fdc41807637477bb1b9cf35d57462687b9eb65ff41c7a74ee5ea1a84737b4ce9906962efd5db0bc63d2e3e10f647f9665e6b1039e424505ea85b1cc589022d3e6df399311ae49be829212e5535a9e05aee507210a03119d714d995d5597bf205f86961133f6416abc1b34080eac0463a88c7abd295") 2018/03/29 10:48:36 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) socketpair$inet6(0xa, 0x806, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000700)={&(0x7f0000000540)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/134, 0x86}], 0x1, &(0x7f00000006c0)=""/33, 0x21, 0x9}, 0x10000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:36 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000009c0)='ext2\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) socketpair(0x13, 0x5, 0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000940)={&(0x7f0000000540)=@rc, 0x80, &(0x7f0000000840)=[{&(0x7f00000005c0)=""/209, 0xd1}, {&(0x7f00000006c0)=""/80, 0x50}, {&(0x7f0000000740)=""/81, 0x51}, {&(0x7f00000007c0)=""/109, 0x6d}], 0x4, &(0x7f0000000880)=""/150, 0x96}, 0x40012040) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) mkdir(&(0x7f0000000380)='./file1\x00', 0x100) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000001c0)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:36 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f00000003c0)='./file0/file0\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 527.285686] IPVS: ftp: loaded support on port[0] = 21 [ 528.506144] IPVS: ftp: loaded support on port[0] = 21 [ 528.535045] IPVS: ftp: loaded support on port[0] = 21 [ 528.567741] IPVS: ftp: loaded support on port[0] = 21 [ 528.608341] IPVS: ftp: loaded support on port[0] = 21 [ 528.642263] IPVS: ftp: loaded support on port[0] = 21 [ 528.700494] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:38 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000002400)={&(0x7f0000001bc0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000001c40)=""/221, 0xdd}, {&(0x7f0000001d40)=""/238, 0xee}, {&(0x7f0000001e40)=""/67, 0x43}, {&(0x7f0000001ec0)=""/143, 0x8f}, {&(0x7f0000001f80)=""/255, 0xff}, {&(0x7f0000002080)=""/154, 0x9a}, {&(0x7f0000002140)=""/128, 0x80}, {&(0x7f00000021c0)=""/243, 0xf3}], 0x8, &(0x7f0000002340)=""/160, 0xa0, 0x4}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000002440)={0xf, 0x6, &(0x7f00000003c0)=@raw=[@generic={0x7, 0x3f, 0x9, 0x9}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7f}], &(0x7f0000000540)='syzkaller\x00', 0x1000, 0x42, &(0x7f0000000580)=""/66, 0x0, 0x1, [], r1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file0/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e3") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:38 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:38 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:38 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:38 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000100)='./file0\x00', 0x1) mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x4000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000700)={&(0x7f00000006c0)='./file1\x00', r0}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000007c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000780)={r2}) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000540)="e98776c21ef9ce9e7bfbd122adad38ee71f3b2add4f246860224583bcca9d84db08f7c5bbead4146fe296e42b7b062a9432e8652b32342da661d85d1f163012bb0b5bfb3bbac86f5205c5b01b89cae03bb33f069c9f11b3dcff07c7549b0ae83140c1a9aa247b8a48b93f161ed5c4f7e47bc064bac60c9bd59d5e7ebb4c711aa3a94fbb260c555f541d34613dd9979abc772e7e53c7263803ddd688f81b1f6409e814039720f8b7e75ad7886b9b79250958ee3ea41cccf9706878f4b34cc99915965c39c17ed81c264c191f945fbe7d114263e5bdfff35cc229e352f062e5ed59b88e0458f16304b76", 0x0, &(0x7f0000000300)) 2018/03/29 10:48:38 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f00000003c0)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x80) 2018/03/29 10:48:39 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0/file0/file0\x00', 0x0, 0x8}, 0x10) mkdir(&(0x7f0000000600)='./file1/file0\x00', 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f00000003c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:39 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000003c0)={0xffffffffffffff9c}) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffff9c, 0x50, &(0x7f0000000600)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)=r3, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000005c0)={r2, r4}) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r5}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f00000006c0)='./file1/file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='tmpfs\x00', 0x1000, 0x0) [ 529.565240] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:39 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000580)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000540)="58327f0876e577a0c7ffa832fe531f335a15ffa56fddd48bf18dcc77e9aa50399ce53329d4be2d") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 530.831872] IPVS: ftp: loaded support on port[0] = 21 [ 530.859089] IPVS: ftp: loaded support on port[0] = 21 [ 530.889980] IPVS: ftp: loaded support on port[0] = 21 [ 530.931530] IPVS: ftp: loaded support on port[0] = 21 [ 530.977879] IPVS: ftp: loaded support on port[0] = 21 [ 531.012311] IPVS: ftp: loaded support on port[0] = 21 [ 531.067762] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:40 executing program 3: mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000240)='./file2\x00', &(0x7f0000000280)='aufs\x00', 0x40, &(0x7f0000000540)="cbbe1fee839a4f4b87bb347bee072cb5303df05ea70ab1add3a74bac49ba34e521ca0d378ff98c8b9a4b6fb41f89fda47b02f6e124c9d187ce7e5be8e4f9768769b18da41b05be830c3dae6cdb3692b9a44a950e40a4775d433534eda509c650911ee8") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) mkdir(&(0x7f00000002c0)='./file1\x00', 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:40 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:40 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:40 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:40 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:40 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:40 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r0, 0x28, &(0x7f00000003c0)}, 0x10) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file1\x00', 0x0, 0x18}, 0x10) r4 = socket$kcm(0x29, 0x800000000007, 0x0) sendmsg$kcm(r4, &(0x7f0000001ac0)={&(0x7f0000000680)=@ipx={0x4, 0x8, 0x5, "04a5d89d5766", 0x7f}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="f0595088279543d3cc46126bee05d01d9ab9f73ac04e8ad73da1b18a55c6e70139289a0f689e", 0x26}, {&(0x7f0000001740)="eaa484f748f07fd3ac955d0683edfba1a09250f828c4c804a857bdaf5b53adc0841e101bfb59e715b0ad582d81079c07dd9cff83718429ad73076293ca0ab3f32b1660fd680091b0430c421548004535f1a2d8a975c2cddbdb776cb85a52cba10af1954b2b446e4783582264272c0bc6db44f18ded902dfef92b39393d637bdec68781b8fe69a78589e3955d90436923dbae568422", 0x95}, {&(0x7f0000001800)="4d0e3fde083c994c54b77f69929ce0fcf0c570c993611675e41f22cf6c5fcaa4f97ff72ab479da1a9eb80acf2780b0622126fc49bd76ab26cefb6e0e8ec141ca43c22da71e121a7828d1c545e871aa504f633229c6e2bca10906e5d21dd63049d1eed6ed1445fbf9d63f996cf42ac2f479fd82b8b86b549330867c1c5871ff459f6f7aeeb263826a85fec68cee08576c041dc225fbe576b3890770fd521ac70bc4c6158d8a9c80d7622e74513cdd1ddd244b1c9d40e55722faa56582aef70cf6118da206dd97a9d42f6190d417f929e429727fbc1b184aa168b06afbe17fc357df54a3", 0xe3}, {&(0x7f0000001900)="f4214c02e88925c705ee8aaac57d81d44441ebf3e4c5948a7aa0b5989d0c6bf1e0bcefa6c8938383aec2b1db4bf114b8c5e134323e1c72b3793d1c531d8df414151fdcf617eff4a5e2dd217af9a45b5ec6a1439097a56a33c0ed0ec5a2d646b74b35b23b3a0c4d1c2a3a7116fd302231c6bb185ed8a699b6282adc636bd948bf55bc050b27074f7c0af6e94f6f32f3b7b13d57372b7cc723837ae4672c30a79b3c7277186d0a32eecc2951d713eaf88262461c81bc6c474929197e5c5d6e4b4c91294a80d01adcec57ebe5a67dbd504dd92657", 0xd3}], 0x5, &(0x7f0000001a80)=[{0x20, 0x13b, 0x400, "9f295dca9e77e0a2a7eba88a"}], 0x20, 0x8000}, 0x8000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000640)={&(0x7f0000000580)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:41 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mount(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000540)='./file0/file0\x00', &(0x7f0000000580)='9p\x00', 0x80084, &(0x7f00000005c0)="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") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f00000006c0)='./file0/file0\x00', 0x0, 0x1537d0b3ff77cce4}, 0x10) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:41 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000540)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) recvmsg(0xffffffffffffff9c, &(0x7f0000000800)={&(0x7f0000000540)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x80, &(0x7f0000000740)=[{&(0x7f00000005c0)=""/231, 0xe7}, {&(0x7f00000006c0)=""/78, 0x4e}], 0x2, &(0x7f0000000780)=""/67, 0x43, 0x100}, 0x2000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000840)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000880)={r2}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000008c0)='./file1/file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 531.934562] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:41 executing program 3: mount(&(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='./file2\x00', &(0x7f00000005c0)='nilfs2\x00', 0x4020, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x80, 0x6, 0x1, 0x1c, 0xffffffffffffffff, 0x200000000000}, 0x2c) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000740)='rpc_pipefs\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000700)) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000ac0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000007c0)={r2}) recvmsg$kcm(r4, &(0x7f0000000a00)={&(0x7f0000000800)=@nl=@proc, 0x80, &(0x7f0000000940)=[{&(0x7f0000000880)=""/170, 0xaa}], 0x1, &(0x7f0000000980)=""/91, 0x5b, 0x97}, 0x10000) recvmsg(0xffffffffffffff9c, &(0x7f00000165c0)={&(0x7f00000161c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000016540)=[{&(0x7f0000016240)=""/239, 0xef}, {&(0x7f0000016340)=""/119, 0x77}, {&(0x7f00000163c0)=""/88, 0x58}, {&(0x7f0000016440)=""/225, 0xe1}], 0x4, &(0x7f0000016580)=""/64, 0x40, 0xff}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000016600)={0xa, 0xc, &(0x7f0000000200)=@raw=[@generic={0x4, 0x1, 0x3, 0x80000000}, @jmp={0x5, 0x401, 0x8, 0x5, 0x2, 0x0, 0x8}, @exit={0x95}, @generic={0x9, 0x9, 0x1, 0x6f}, @generic={0x800, 0x90, 0x579, 0x20}, @exit={0x95}], &(0x7f0000000280)='GPL\x00', 0x4, 0xf9, &(0x7f0000000600)=""/249, 0x41f00, 0x1, [], r5}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)={&(0x7f0000000a40)='./file0/file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000780)={0x5, 0x9, 0x7, 0x94, 0x2, r3, 0xfffffffffffffffd}, 0x2c) 2018/03/29 10:48:41 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:41 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:41 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") r0 = perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x7, 0xb8a, 0x5, 0x1, 0x0, 0x101, 0x240, 0x1, 0x0, 0x3ff, 0x80, 0x1, 0x87f, 0x2f55016b, 0xff, 0x7515, 0x7, 0xc23f, 0x4000000000, 0x10000, 0x5, 0x10001, 0x2760, 0xffffffff, 0x9, 0x0, 0x800, 0xfff, 0x200, 0x0, 0x66c, 0x5, 0x5, 0x6fb, 0x3, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x36678d98}, 0x0, 0x6, 0x10001, 0x7, 0x1000, 0x100, 0x3775}, 0x0, 0x2, 0xffffffffffffff9c, 0x9) r1 = perf_event_open(&(0x7f00000005c0)={0x4, 0x70, 0x800000000000005, 0x2, 0x0, 0x2, 0x0, 0x1f, 0x1000, 0x4, 0x2, 0x6, 0xffffffff, 0x80000000, 0xf9, 0x54, 0x0, 0x6, 0xffffffffffffff9a, 0x1c, 0x2, 0x80, 0x1, 0xacd, 0x6, 0x5, 0x83, 0x7, 0x1, 0xfff, 0x10001, 0x9, 0x1d, 0x7, 0x1, 0x7ff, 0x10000000000400, 0x100, 0x0, 0x400, 0x6, @perf_bp={&(0x7f00000003c0), 0x1}, 0x400, 0xff4, 0xe00000000, 0x7, 0x8, 0x0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair(0x11, 0x7, 0x6, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000006c0)={&(0x7f0000000640)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x7, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r4}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 533.275069] IPVS: ftp: loaded support on port[0] = 21 [ 533.302890] IPVS: ftp: loaded support on port[0] = 21 [ 533.331910] IPVS: ftp: loaded support on port[0] = 21 [ 533.370126] IPVS: ftp: loaded support on port[0] = 21 [ 533.414277] IPVS: ftp: loaded support on port[0] = 21 [ 533.448868] IPVS: ftp: loaded support on port[0] = 21 [ 533.496626] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:43 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:43 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = gettid() perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x8, 0x401, 0x1, 0x1f, 0x0, 0x8000, 0x80000, 0x6, 0x3ff, 0x101, 0x0, 0x2, 0x6, 0x4, 0x101, 0x81, 0x400, 0x0, 0x3f, 0x7fff, 0xfffffffffffff001, 0x9, 0x100000001, 0x0, 0x3f, 0x3ff, 0x6, 0x56262902, 0x80, 0x100, 0x3f, 0xffffffffffffff52, 0x9, 0x3, 0x9, 0xffffffffffff590b, 0x0, 0x7, 0x0, @perf_config_ext={0x6, 0x100}, 0x4000, 0x9, 0x800, 0x0, 0x407, 0x1, 0xffffffff80000000}, r1, 0xd, r0, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f0000000540)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r2, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000580)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000003c0)='cpuset\x00', 0x0, &(0x7f0000000540)) 2018/03/29 10:48:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:43 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="9ff13944e7656a9165ee636c07df14008911dca8940cda17f12c331a54b7a7f1f6f1e970920c69e00ff379c13a31f9896327a1a972acb829a66e3cd770e38a5a84ae316e446d86b16bf8f4d95c5e5d7f242758a2cc4a3f9d7b400a54fc99da8279a51083328e25fcae5136b29fe84c8c6ccb1c17b3ec95149f1b5dde1e687491e4fab75fc8ec36bdca2a009fb183f7ddbccd8a5d6638d68cf08c41b13d0b734dc25be1f135c9938f44892117d0800d5e2a74db33cadd0ffd9e") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:43 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:43 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='omfs\x00', 0x2, &(0x7f00000005c0)="fac96362bd546e51e1ad791ab9484a54f55569264cda95dcf8e51841e8ce58fc91c37dc8d032143a24a3af53822552c9d83477d846209ff1ae1c693f7f2c6dce46181848bbaef3649e43f8213136e99fc59270f6c5a9453f73930fd28764cb6787cc19c3ffeaba7e14b57d2984a7f4de07c28bc664b5ac7f8c35dae247950e64714dd33c767dc169ffdd90737f6f7ac66237588c31b3ae431cc71c094ad6a871559ad39d") 2018/03/29 10:48:43 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000002d80)) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002d40)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002e00)={&(0x7f0000002dc0)='./file1\x00', r0}, 0x10) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) socketpair$inet(0x2, 0x80000, 0x4, &(0x7f0000001940)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000002d00)={&(0x7f0000001980)=@nfc_llcp, 0x80, &(0x7f0000002c00)=[{&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/183, 0xb7}, {&(0x7f0000002ac0)=""/118, 0x76}, {&(0x7f0000002b40)=""/129, 0x81}], 0x4, &(0x7f0000002c40)=""/150, 0x96, 0x9028}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000003c0)={0xffffffffffffff9c}) recvmsg$kcm(r3, &(0x7f0000001900)={&(0x7f0000000540)=@in6={0x0, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000001840)=[{&(0x7f00000005c0)=""/4, 0x4}, {&(0x7f0000000600)=""/87, 0x57}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f0000000700)=""/188, 0xbc}, {&(0x7f00000007c0)=""/4, 0x4}, {&(0x7f0000000800)=""/53, 0x35}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x7, &(0x7f00000018c0)=""/24, 0x18, 0x8000}, 0x40010000) 2018/03/29 10:48:43 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000003c0)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) sendmsg(r1, &(0x7f0000000600)={&(0x7f0000000540)=@pppoe={0x18, 0x0, {0x2, @empty, 'eql\x00'}}, 0x80, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x8040}, 0x800) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:44 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file1/file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) [ 534.446178] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 535.757701] IPVS: ftp: loaded support on port[0] = 21 [ 535.785514] IPVS: ftp: loaded support on port[0] = 21 [ 535.818670] IPVS: ftp: loaded support on port[0] = 21 [ 535.857770] IPVS: ftp: loaded support on port[0] = 21 [ 535.899439] IPVS: ftp: loaded support on port[0] = 21 [ 535.936381] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:45 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="9ff13944e7656a9165ee636c07df14008911dca8940cda17f12c331a54b7a7f1f6f1e970920c69e00ff379c13a31f9896327a1a972acb829a66e3cd770e38a5a84ae316e446d86b16bf8f4d95c5e5d7f242758a2cc4a3f9d7b400a54fc99da8279a51083328e25fcae5136b29fe84c8c6ccb1c17b3ec95149f1b5dde1e687491e4fab75fc8ec36bdca2a009fb183f7ddbccd8a5d6638d68cf08c41b13d0b734dc25be1f135c9938f44892117d0800d5e2a74db33cadd0ffd9e") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:45 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xe, 0x80000001, 0x3, 0x1, 0x8, r1, 0xfff}, 0x2c) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:45 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea2094"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:45 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:45 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:45 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:45 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f0000000740)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x4, 0x7, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa35}, [@ldst={0x1, 0x3, 0x7, 0x2, 0x4, 0x80}, @alu={0x4, 0x2000000000000000, 0xf, 0x1, 0x4, 0x4, 0xfffffffffffffffd}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x800, 0x17, &(0x7f0000000680)=""/23, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffff9c, &(0x7f0000001040)={&(0x7f0000000c80)=@hci={0x0, 0x0}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000d00)}, {&(0x7f0000000d40)=""/23, 0x17}, {&(0x7f0000000d80)=""/144, 0x90}, {&(0x7f0000000e40)=""/53, 0x35}, {&(0x7f0000000e80)=""/56, 0x38}], 0x5, &(0x7f0000000f40)=""/226, 0xe2, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x7, 0xa, &(0x7f0000000540)=@raw=[@map={0x18, 0x8, 0x1, 0x0, r1}, @exit={0x95}, @alu={0x7, 0x1, 0xf, 0x7, 0x1, 0xfffffffc, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r0}, @map={0x18, 0x8, 0x1, 0x0, r0}], &(0x7f00000003c0)='GPL\x00', 0x364f, 0x1c, &(0x7f00000005c0)=""/28, 0x41100, 0x1, [], r2}, 0x48) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:45 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:45 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:45 executing program 3: mount(&(0x7f0000000200)='./file1\x00', &(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000280)='qnx4\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0xb, 0x7e, 0x6, 0x11, 0x1}, 0xfffffec6) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000003c0)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)=0xffffffff, 0xfffffffffffffe36) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r2, 0x0, 0x3d, 0x6d, &(0x7f00000005c0)="6d4247c4d94e1a9fa5a5fc67e4b5c158aa8e9a46fa4db97d444b9d2c6e0363f850075382e03bdf9d49624da9e8ff2126e9283795ab5e722cd8f86a7a76", &(0x7f0000000600)=""/109, 0x8, 0x10000}, 0x28) 2018/03/29 10:48:46 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x44c4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)={&(0x7f00000003c0)='./file1\x00', 0x0, 0x10}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:46 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file1/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r1, &(0x7f0000000540)="28a73b51a2255b4c2699be0e2bb4889bd2220003a2e80b09082d402c3ef137f9f084d6e3cf8c01e73ccac7cd1faa952232f815def8a1de1254c3f0faabd558e93e1112018e04a7ea2cc754b6b5373dc4461365fe5a09c5af4e195a9ce1ee0389b2e6218529281e8c3f63cb80e5091a0a6f4355aa0bf3802e8fa904e2025356880a6b79cd13e737ad4cc30375ce70e4a072095d6f53f94a54ebae0142bf2b078d973d582e2d64", &(0x7f0000000600)="b832c1b1e1be955cac67e5d81c044ea1b2126b5732ee68fbda259dea95623423de1b82c5f165315b6f464dcf184df21abbf879c2da307004430623a399420912abc0cd0aa2435b700ac62f69675a224585b1dff2b915fc6ae341301cbcf96c3c1cd64296f4a454272a2dfae841ce88244dab685491ac0319554761e3e5a0edcd79a8337a3b06a59f04478288be95d0e8b19de9c0b560dfaba9c7270d7334f9b0a964834f9d8478d6fc477db29c9c3138786d1e3a39cd6e042afdc6adb94046292eea51016dad19fb2d2a6b30037e5b578cd9f1831c48c3ec738ea80f0c220c21facf71d3ee08ff087991ddfd5e367d14785cafa2bdaeee20cdb1a06b288c", 0x1}, 0x20) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 2018/03/29 10:48:46 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x800) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 536.847127] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 536.876939] IPVS: ftp: loaded support on port[0] = 21 [ 538.123308] IPVS: ftp: loaded support on port[0] = 21 [ 538.150559] IPVS: ftp: loaded support on port[0] = 21 [ 538.184283] IPVS: ftp: loaded support on port[0] = 21 [ 538.235806] IPVS: ftp: loaded support on port[0] = 21 [ 538.272388] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:47 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:47 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="9ff13944e7656a9165ee636c07df14008911dca8940cda17f12c331a54b7a7f1f6f1e970920c69e00ff379c13a31f9896327a1a972acb829a66e3cd770e38a5a84ae316e446d86b16bf8f4d95c5e5d7f242758a2cc4a3f9d7b400a54fc99da8279a51083328e25fcae5136b29fe84c8c6ccb1c17b3ec95149f1b5dde1e687491e4fab75fc8ec36bdca2a009fb183f7ddbccd8a5d6638d68cf08c41b13d0b734dc25be1f135c9938f44892117d0800d5e2a74db33cadd0ffd9e") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:47 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea2094"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:47 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:47 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={0x1, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={r0, 0x3}, 0xc) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) socketpair(0x1b, 0x80000, 0xff, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000680)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000640)={&(0x7f00000005c0)='./file1\x00', r4}, 0x10) 2018/03/29 10:48:47 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:48 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:48 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") socketpair(0x0, 0x3, 0x2, &(0x7f00000003c0)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001a40)={&(0x7f0000000540)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001980)=[{&(0x7f00000005c0)=""/61, 0x3d}, {&(0x7f0000000600)=""/140, 0x8c}, {&(0x7f0000001a80)=""/250, 0xfa}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/112, 0x70}, {&(0x7f0000001840)=""/233, 0xe9}, {&(0x7f0000001940)=""/43, 0x2b}], 0x7, &(0x7f0000001a00)=""/56, 0x38, 0x14}, 0x4001) mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f00000006c0)='./file0/file0\x00', r1}, 0xfffffffffffffea4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:48 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x40002, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:48 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={0xffffffff, 0x4, 0x10}, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x6, 0x1, 0x1, r0}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:48 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0xfffffffffffffe96) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:48 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f00000003c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x10, 0x0, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r0, 0x28, &(0x7f0000000540)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r2, 0xa2f7, 0x18}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 539.251657] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:48 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 539.281450] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:48 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:49 executing program 3: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) sendmsg(r1, &(0x7f0000000780)={&(0x7f0000000540)=@llc={0x1a, 0x336, 0x2, 0x73, 0x3, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000000640)=[{&(0x7f00000003c0)="fbe16a3bbb176a9a5aed37c6a810846dbfb97f244be78e42449c6fff345e5d23667625ed8f08dfaa63c73c9b0202d2b71f76", 0x32}, {&(0x7f00000005c0)="523d0f8e8804f0352b2cac33c424294d923136fc821981b10d2f3a39a13351fbcf7f7c62320a9f3cef917bea5d0db90797e3dfb85d4e1b5791f2f6b957a2102bf907aa8908352e4b6b9cbcf2308f591152e26b9097248a6a73b796f6d8badf8384aaaeac004a66a1", 0x68}, {&(0x7f00000008c0)="33d35fcf5941afffe4969838528b95aba6bf01c893233d2c3a57f513a769efba2be8789b73b496dc75424ed1e98cf76c308242f381a27346039de9e7fb7de3fe9d50dcbdae39c121bec50cecb0811a2044ccfa6323f8cfad749e35c02460cbc29c271eb61727f18c0fd09243f60e9b8926c83463772f840a6dd9b0e9dfdc6db390877bfa77848be309e3ea55ca21692943e69006260f22f0ecca748070838c401c5f4a", 0xa3}, {&(0x7f0000000980)="708afc19dca0edddeba96061e0e3c0991789423a22c79aa896085083c3b64623e0fc37d295b5ea7b1126844ee3032891a0ec72d6d306ef5214b0b7356ec5897839c22be00cbc8f723a29edc075f3f1bf9cb5202de5007ba14d3cb5dc03d65e616eb2130b51f55e137e0bed40b026af1af332fccd830e20ae6e8210e45add43dc876f087ba35e027029ca517e834a390ab8a8f94f48127499b90f3beca8ea95a1fe7188ca42817e886a193b2a255fcfd3f4ea38656e649ce24810a6755ba0f5b41c4de58790f49abe628021911547f9a57843288f485ba039e8ea5912aed61a6dfac24801f6c2027f77201804931348ca0572a31815f846c7d77f7de64f7d70dbd0aa00b55404dc2191a07bc5b39e7994acae231313e3ec1f26eb46935cc14dfb542ef4dc950fff6050a78cbe427d356a6ec78b7a173225e9af6f83a8b459281620a8cc1d399a438a5417836e55e42ff2cb77d1b96811adc59e67d62185991c3e51ceeb1db0fe822cae7c76ef7e37285931ed2f763e5b949b030f87d79dbddfb6b1d611b42ad12977406178c93cfded6ed68f1a9283d98c4ddcc58644af12a44b5c9a148ae76d9cde0c71a532c463c91825a82035cb8ce820f90d4c0e89f4b91082f4cfcefda6b72778f3b76677233318f149883d7da49b04ae1cab0909b1bbad3c54b96bde19452c31551bdb54a258bde040c6e5eadebd7f6275be68e150c2828c2630692502a8c8e1f8c349e1b3a169aa7d1f9feb15293ded543ca2e36ab5a08638bdf4a556d9fbbbb0110ec7c0387d805e9bcd8d7eefdccd0338143a3cf4baf552d16e646dfd4753d9b26a39bb80383911959692ba0ac6179433e2b8e15d9f7cc791ae5a55ee996effc8b604453233c894080ee44aa61935ffff3aa6c45a085669c0c42c28d6a6c2875e6adbc64e80a324ace5ba19243e28f796e78fc6752730016f274f124bc777c986fb37a0d240007dc8f98b630ee91bc24ea90922c538ca39b3712a29a0662be64dfc35380fac437ec152dd1d5525aa89d71143ba00bb88fac42b9b7f14c4cfff9b2e5443bb735536a3027d52b3fe3b6d41c3c5e943562e690b0967686627999da0e4c8b124b66cc58b9ecdc1e4f1d9886e1fead667beb69005b09386d38bbd0ee552e9dc0f2de4aec8064f4590c2e514c3c0e5e22d3240c85f928f90fd67fce608cb278307f92c996ae766ab35d5c7d1bf02e7a99750e23ac7e99b6edb9c66935ae78132750a4da0daa49146751585b492257852408661bd709d1ee4abf7c0c2be41b7dc2fc9d0e1e3d8f751128515462f12c404dc6f297041e680fda47855ac65ebccbeb9409e02bad738fcd7ea2f4dea0b9554df230fec9a78f70d8fbd6692b2cce0317cf625f9b0f1ccbfc4a376b3beebba15efc1835533eb24069595862353140e3129d64aa38c480428ccf08a56434a41f98e180d69c08b6f1931bf6fe19f06278f0269ff4e9ed6964f886035e6ac29d981c1a6aa3b94894584e95de490eee6421eef58073ecd82542e8b81a86918ef03a58a4c829d19a6209472c11801f017623e9f0e7307ad49704d0f60ddbb4fea1ce905941f5d0290e90f7316cd8b1ba1b6881242ce02d9b2fec4abc8f0a3353d5137d2fb430b9480fb6b4230c596c35ae5b1cfc0e5fd8afe1c0ec079fbf8d6f87eac96251ba2504745f499665ec8b068ce443c1580be06d4a18ac3bc0d898f1dcc295e36082fb0142d279646e9f804ef50c887a8b717fb7fc39e26c5bc65cc58903b3ad360e6bedc1aa265872bd41d9ab1089593e5303aed054844be8c1d0ae2da84585ad7b9cbdb5a50ef43ba10527bea133a8f95d5634bee7d024c82be8aa829ecc7cca3b2bfc90036b6b44782e3e162e82e05256b8e71a69aaa94e6bca132a043d97853cc69680268f25a8143986d33bf18e082269f96f8d393ad2e5ac5b601a694ce777f1114b1d774a8fe7d9f179b409f7259abfcd052ce004c9e3caa06771d46c9d2d4b26c39d24f69d6d6f61f1a6065b6a90b11e4c58b2d27458857a83c13e41089448f1a8e1a75bd5f04c4fe7b86a6c3be8689b6f27bca60381ecb981265951e4f48a8a2427c272a4f6770104f4234acd6e2d4425ba23d1bfa7c1d7d41914fe96528b519636e96e7877aa78434c0050ab443beb52e2c287bcd5ae7e29e8d78be032717baeba9c19a6af109d7a093c5f75c929103d8323b1e91a51be7cfca37497c304e5b597e3a69de348a6bd9a6e3edc553a48c88c5da2c67066e9df652a9b25a5956b2773c2f31b739d0b063ca19231bdf146e91ce597db0c58dd966c2d8254a42b10faf2a93038ece60ec45030f931c1656a7643a37aa8faaa778995de74aaeed3441553b2ce4dd8d22ed2467764e079f56069ac454f8d3efc6fac4a5ade754c2b23178374d462935a0b9e6dc225817368dff679e7a5278aeeee1e8811ac620c11673c6669198eb54bf812125a7632028fba767ee4417ce84a5c148223e77b76b62cfad9dd203b2bdd6032e115234e7ef27d22724e891e05d732631cae520ac058b04aac79387447dc3b527daa3f87d0afbb845af66ce24f90fd600fec9cd270ca7be2b6e78251796946caf5772ef6177b011f97f43f7ceab8c1ba7137943d3842fbf2eee4c050185a01fa68ce58fe294465bfabcfbbc4ec21baa34bc24f1dde7ba6fbf8012138e024078eda0516dfbad8e9f8cb27615c119768ad90dd0b246dcdf56de1bee7f2d728c0a60c8620db53c5edadcffcf12a17fbfc330fddfc91a7108586f8d1fd63b6b5cf9badc852f0df458ab050be57ca0eeeca25f7baa9ad7294b3fd6dc4778d017c68a2188f373711d916842c6b330d4965a379f68ee7a37d3953479b7581beec5a4c022add9e783c950285bdbc5188c096613171222db78760ab5ec9de14795a45cefacd78ea3a636bb7e7f7427cba51015d61bbcf9f34125ac3e356cdab636940a5f1834aba0affc4e0260688a73a13413d6fdff41d717169114808f66cb72762fc0dbac1e2e87923a5deb576a1960e8673ead1e4be8b7fa4f3205bb5765ad5799bc3ef9b480846eea93a2fb9fa4b8aaea104224e9cd9e4a08e71ec71b55494b855030bdfb9605eb68681bb84855859b0f835c0a7abd660beed6170b30874c712f238d4a21fba92ee09927c80acf9bc945c2bc9202cf71bf0308d5980e734a01da32a66e0fc7b02dd0af7a0e86d623789060e809d2a160a55fe7a46eab90bdf7837e9f16b6f51a8ed92ff8ceaf2b0bb4bf6865cf952daa35fbc860a821ee4d2dc24def396b3a110675725467f05af684854471c69daf65bdaa81e5110d131f659137fcc320191c3ccc132d7a84a83adc56538156ac620c12cbfca0336b3c31783742e84f3328c73ee9b93868214629e59c618bc1cdcb331397e4257fdeaf97249d8e195017c8f3b2b294e16b8a7b5fbd2d99bb08c7dc8d2b2c16021b20b63a4c169a67b4134a454e5c026762beea00d5662c64a901cf1a35aa975768bd49da26bab51042995d51ad67e89312c87f49671c64e0b13bfee2649d9f1a3adb98d2dc4132620dfffe7d005f90bb4badcf8dc18bb43f762155a49084aeca688db348af82f1284b1687debf803be674814c107dbab37c7fe0d06722e749bc17a4ea9767ae7945ebffa32103e100d44525c1dd3acf22c89ad342635d464c4e9bdfc072bc0fa7cc64390eccf626ed489841e2a9799d319feb3d58edb17046ca8695726ddf9c79015b3e2f2c5c3b26d7664bf846988b4e550a2aac9ed1f4d6561ab0b7eb85d5483819647401ef9116594d4a83bfadfab94b124358ee9ff1e700bb21c0106a1c46ce66a977d8dc2e8c7f8c8ec1eb4e231499a88b2a61d662dc92cd2d3060309642d982d88861549396eec2821d31426567d35b2b5057a0df6da3eb7875d6e2245a5e9432c06ccdf7409abadf9342bcec84564bdb9e4886e77d57d6a0f71b1212bc713a0c27410df8a06712be134e5833dffba2087d93cc96974717fbcdbe3fa148fe9d7b89ff47bb0f11c7e740b3dd296a0c47bb7162250bb699e2b970c2b86c7591d8628370330cc05ad5720239021cf8b09e069ab42bddcb5cf429ffd92cf83c4755e157e6c7e0691579b2a0272d4701499788e86527259bcff855992509e57b88c0443cb31443483d4675a63b71c9460fd6c9c931ac70762867606ae951e4f77c6b2c6094bbb31f6185645c9c66bd9e9c7ac9b589a3d8cfc0ebc9c03923900b63ccd053694a8f9b45b3145616fd912203a64e0b9bf839b815cc711941cfd07eb7ea241e030935c1d92d66d833047cdf632571bfeb98e4f95bbb701ae059575439699621eca4884edf15c0a1cc823f76667309265ceba45008245c9839090d432195ff5a2afbb429aa0f964535daa481fa3a9c5ded9de7d649ec60ba1df50f8c780b463871c2b5c60246b246314e6cacecb22d0613f4e2d729e889bab2bbf44443c726e45a3467c43fdd41397d94e075bb2826487ace109d81ba644908d6a78ded483aaaec4628f9e0f4ba32d3f42bae155b02a899f96092e41c07e7634b1896ab49e495c05899b90f69490ae4868283e2b9c3191104017ea5f7f7d23c38e0bff9dbaaf512c4cab0350ce31058c572e5158e796e245e20e6b5f66a00dbeb45ca3c681a4ffa2d0f9305605031c63c881c90fb4212bdf5f1367cfaee7743504b4b460c9c499c19256386e97c5c68046df0fcc594f7f84f811a1c0c4621d163c418f93efb6b7bef8193128a428dda9f70e19f4ce656fb0a68581423856d275a3502162cfa082be5dd82902980a3770a7a66d854aa8ebe593f0c9da33dcd59430adee7f9d96f130c9549eae7fbd712e69aefe74c44bab1f0cbaedb3aabff791eddde1337b1268f36dd216568fa18263240b3d5a8b99dd0f7fdc1db9a647cea406abd8678df73dba6baba67561f40ea8043c934b1e398c19e23f5ae38692236dcc2cad9c411aae0f26d17f857981fff833a295682c4101c376099a88aa508193d40faa65acb2c8368a75d2c2b9da671a53154a005324cfc6ba337fa66ca3982ab340487bc5bd7ce711453bbe0578add01efe8c60fc226ed75e8e64e50aab67ff90fd1bdcd18fe4287eac6ce31635c1e6285c8be47499764b4a8976084a4845cab1d28ccc36aea6030cb41867bfbb872a43a982787ece5a10fdf383d014361fcce5eb3d06e75963346a71f225e440a4f98ba7051f11f365ab85c9d6e468035e12029bb85e7a66eb5651a76be727fe1d91da0d718af949fc3760c270ec623180e36beb9bf1be02a5f85be00088ee196ca57ec576fb37ef368be7ee3a3f011d1fcdec587905b963ecd286262d3ef72e7b717527ef2ff0c8c79f08fefd15da0a0f5a7112771902db0574430418d63bc79fd45eb5656a9026425e3fb8b7a341201f28a3bdc9e859af3a49525b3a14370afbf052e16be4bd66ddbd0f0b94ab3b293c3bec0e9c37104d4ebb7251ef23160027bf1df255f363c3d5d626ea0bd39323f47642dc230d89744c57347aef7b0b56bc1e5c7ae240fd628df5166473c74f23e09bdef80a5c4d088ffc7726522b95dac656abe5b7965666de6b461c42c687f166e14b0b3ae4d5c9a26dc4b6f28b0d45ad45102c9086b3ea2781dbe2f9943e0a73c0e20b60313b8c084a1f89d508f699a22899d960d69aa9f849f925ca3455b3ad9d535d350492392fffd0768cb9fc824b896ceacd3d415472f99d73e9d7feeec0594f665b5a4269cc25611f558cc75c7d2365ae6d02b2efea854060cdbf2dfa7ba670271ce351cde0be09e62e29975fd813553708e811e5c", 0x1000}, {&(0x7f0000001980)="8bd3ec0b65a78b82d007dad0f6b65f49e7e810e3d2b217fee7166c8781210c4b50cea89839793fbceb85802a62bfa504c09acb5adfa3e478b9cdc7632493b069ab4114c2e93816f5e94f6a80e6a499f3a4222894ffd03ff8a5b69067eabdfee8adc1b5cc70dda5753b7b289164a8f5d07b2ff68fc49e79f4dc6ffaf8e5c14fce73abf3cd353106f27acf8c72569ed2445e44ab94fc524c76a7473deff859d063da369e94f16668813c6d058200dde62bbfb5bae850abd3934587c470807d4b5c9b76af4bd4a944", 0xc7}], 0x5, &(0x7f0000001a80)=[{0xa8, 0x100, 0x8, "b11d61c809a66b0f144a43ea13cf7e20bb7be484fe91ef1a01b1568e8467540e9abd88aafea6bf72254d29849c89c44153f36b71dc46bde3cb25c0eb85f42a5fc25ef21cbedd01c307e75c6fa6ef38b845b184c759292659a79937d8663c8cde31651136be2b13422e828f88a2a1903acfde5bd12e205557526256c929d51c4d848471a93e440ca79b41edc2748aadefd5db28c28e"}, {0xb0, 0xff, 0xffff, "f215cfecce859a9bb264cfc10b6370386828ce0c03a6b60d48913daa35967c6a5ca938f616cea09ede629b35ef398b9ab89ed3050f3cf64c0c0e78f82143c9fdeffc4057d127dcb6d36cf0e69147f0eb1e3afebebf8447f4d4210aa65997cbc42683a6a9fb47ab5abfd21dbbe76b79a8d891c59dd7295c6e22cd0bc88b0c6ccfaf2515070d9b28fc83ab50da2d16c3f854f6f7627f34790fbc48df2882a4f1"}], 0x158}, 0x800) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000006c0)={0xffffffffffffffff}) recvmsg$kcm(r2, &(0x7f0000000880)={&(0x7f0000000700)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=""/149, 0x95, 0x10001}, 0x40000020) r3 = gettid() perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x5, 0x10000, 0x80000001, 0x0, 0x80000000, 0x20, 0x4, 0x9, 0x5, 0x1, 0x7ff, 0x10000, 0x4, 0x8, 0xd3, 0x2, 0x8, 0x4f, 0x200, 0x4, 0x1ff, 0x4, 0x179, 0x9, 0x7, 0x9e, 0x6, 0x2, 0x80000000, 0x58, 0x9, 0x800, 0x8, 0x80000001, 0x2, 0x0, 0x1, 0x2, @perf_config_ext={0xc4}, 0x20080, 0x1000, 0x38, 0x7, 0x9, 0xbc, 0x800}, r3, 0x10, r0, 0x9) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001d40)={r1, &(0x7f0000001c40)="e49084bb7957fdb40ff684d597df2d6c4968d1110ccc9ec19de1774b619a68400372d444dcdd078191e4d970bee790b5a80858ea2bfd2b0e4ce67892f74d0b5b72bed2a78e40c176164df0a8b64721c6f2af372c8f0fa8ba0b1ac5142374c5ccfe3c9348ccb385bd737d706d25ed13e0d7912d45e24fecff1e0b1fc5073429945cb42eb76e13feb5f286b3f6cc76e0ce047fca5fd9e6cc0ca304473714e5b60d77e67be3d977b39bf341edb9e25a75cc43bf915cb4ad9b75", &(0x7f0000001d00)=""/55}, 0x18) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001c00)={0x3, 0x0, [0x0, 0x0, 0x0]}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) mount(&(0x7f0000001dc0)='./file1/file1\x00', &(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)='efs\x00', 0x40006, &(0x7f0000001e80)="cc7de0a4a1cbf5c5bb3e7f3cc62a851d1aa1dbb5c65c055aff870bfaab1b3993f2e5e54079549e1cc45701ab1796ee45d9a00c693f78e8edce10a7da641b46827ae42559bb0b725d33c22ea0d0fe242d8257653fb5b823c4645c099a5b44dcba146b674b06eadb2cd254ced4029e3c4414b870566fe869e7cfbde727811c84aea4241549634d3abbfc399d559dc6155507cd1aef1afad3db15c5dfc6364ec3302e5c159eee2094f8a7ba4c0d877bbfd6833190577afd13df1e1a1befcc419ae76df694994ba86c67a7556917f820492746e00f49efdd1d69a93cd32a6417f0f2379f69ca53ca7b3c14f59a68") r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r4}, 0x10) r5 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) getpid() ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000001d80)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:49 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 540.423278] IPVS: ftp: loaded support on port[0] = 21 [ 540.448872] IPVS: ftp: loaded support on port[0] = 21 [ 540.479124] IPVS: ftp: loaded support on port[0] = 21 [ 540.519580] IPVS: ftp: loaded support on port[0] = 21 [ 540.557963] IPVS: ftp: loaded support on port[0] = 21 [ 540.599183] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:50 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:50 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:50 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea2094"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:50 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:50 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:50 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 541.518273] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:51 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 541.545267] IPVS: ftp: loaded support on port[0] = 21 [ 541.579480] IPVS: ftp: loaded support on port[0] = 21 [ 541.624743] IPVS: ftp: loaded support on port[0] = 21 [ 542.896923] IPVS: ftp: loaded support on port[0] = 21 [ 542.922504] IPVS: ftp: loaded support on port[0] = 21 [ 542.952848] IPVS: ftp: loaded support on port[0] = 21 [ 542.995239] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:52 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:52 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:52 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:52 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:52 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:52 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:52 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:52 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:53 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:53 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:53 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 544.007242] IPVS: ftp: loaded support on port[0] = 21 [ 545.073727] IPVS: ftp: loaded support on port[0] = 21 [ 545.100518] IPVS: ftp: loaded support on port[0] = 21 [ 545.134668] IPVS: ftp: loaded support on port[0] = 21 [ 545.178113] IPVS: ftp: loaded support on port[0] = 21 [ 545.215515] IPVS: ftp: loaded support on port[0] = 21 [ 545.249723] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:54 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:54 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:54 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:54 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="9ff13944e7656a9165ee636c07df14008911dca8940cda17f12c331a54b7a7f1f6f1e970920c69e00ff379c13a31f9896327a1a972acb829a66e3cd770e38a5a84ae316e446d86b16bf8f4d95c5e5d7f242758a2cc4a3f9d7b400a54fc99da8279a51083328e25fcae5136b29fe84c8c6ccb1c17b3ec95149f1b5dde1e687491e4fab75fc8ec36bdca2a009fb183f7ddbccd8a5d6638d68cf08c41b13d0b734dc25be1f135c9938f44892117d0800d5e2a74db33cadd0ffd9e581262184b29c8457e71f3aa320cb3178a05c083578f697d2b311df255db80038f83c8762586f54e0502dedcd46ce7f8e07c511b4a62cabd1895f6550502557120ce478e2456eb833118b12853b71ce8355d8a124814ff7c6abc33b888") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:55 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:55 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:55 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:55 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:55 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:55 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:55 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:55 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 546.127076] IPVS: ftp: loaded support on port[0] = 21 [ 547.355832] IPVS: ftp: loaded support on port[0] = 21 [ 547.382821] IPVS: ftp: loaded support on port[0] = 21 [ 547.412704] IPVS: ftp: loaded support on port[0] = 21 [ 547.452934] IPVS: ftp: loaded support on port[0] = 21 [ 547.502350] IPVS: ftp: loaded support on port[0] = 21 [ 547.542744] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:57 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:57 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="9ff13944e7656a9165ee636c07df14008911dca8940cda17f12c331a54b7a7f1f6f1e970920c69e00ff379c13a31f9896327a1a972acb829a66e3cd770e38a5a84ae316e446d86b16bf8f4d95c5e5d7f242758a2cc4a3f9d7b400a54fc99da8279a51083328e25fcae5136b29fe84c8c6ccb1c17b3ec95149f1b5dde1e687491e4fab75fc8ec36bdca2a009fb183f7ddbccd8a5d6638d68cf08c41b13d0b734dc25be1f135c9938f44892117d0800d5e2a74db33cadd0ffd9e581262184b29c8457e71f3aa320cb3178a05c083578f697d2b311df255db80038f83c8762586f54e0502dedcd46ce7f8e07c511b4a62cabd1895f6550502557120ce478e2456eb833118b12853b71ce8355d8a124814ff7c6abc33b8882d635e21ebf23f57e22349620b8e9aa21b884170e7e5c9a72929ecb3437d2b47e63f4077a652dcd1bb6cf72934b9") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:57 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:57 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:57 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:57 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:57 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:57 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:57 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:57 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:57 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 548.429399] IPVS: ftp: loaded support on port[0] = 21 [ 549.665935] IPVS: ftp: loaded support on port[0] = 21 [ 549.692409] IPVS: ftp: loaded support on port[0] = 21 [ 549.721795] IPVS: ftp: loaded support on port[0] = 21 [ 549.772819] IPVS: ftp: loaded support on port[0] = 21 [ 549.816618] IPVS: ftp: loaded support on port[0] = 21 [ 549.851397] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:48:59 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd2824982"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:59 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="9ff13944e7656a9165ee636c07df14008911dca8940cda17f12c331a54b7a7f1f6f1e970920c69e00ff379c13a31f9896327a1a972acb829a66e3cd770e38a5a84ae316e446d86b16bf8f4d95c5e5d7f242758a2cc4a3f9d7b400a54fc99da8279a51083328e25fcae5136b29fe84c8c6ccb1c17b3ec95149f1b5dde1e687491e4fab75fc8ec36bdca2a009fb183f7ddbccd8a5d6638d68cf08c41b13d0b734dc25be1f135c9938f44892117d0800d5e2a74db33cadd0ffd9e581262184b29c8457e71f3aa320cb3178a05c083578f697d2b311df255db80038f83c8762586f54e0502dedcd46ce7f8e07c511b4a62cabd1895f6550502557120ce478e2456eb833118b12853b71ce8355d8a124814ff7c6abc33b8882d635e21ebf23f57e22349620b8e9aa21b884170e7e5c9a72929ecb3437d2b47e63f4077a652dcd1bb6cf72934b9") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:59 executing program 7: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:59 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:59 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd2824982"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:48:59 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:59 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:59 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:48:59 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:00 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:00 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:00 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 550.734313] IPVS: ftp: loaded support on port[0] = 21 [ 551.975672] IPVS: ftp: loaded support on port[0] = 21 [ 552.001994] IPVS: ftp: loaded support on port[0] = 21 [ 552.035237] IPVS: ftp: loaded support on port[0] = 21 [ 552.075185] IPVS: ftp: loaded support on port[0] = 21 [ 552.112099] IPVS: ftp: loaded support on port[0] = 21 [ 552.153463] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:01 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:01 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd2824982"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:01 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:01 executing program 7: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:01 executing program 7: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:01 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:02 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:02 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:02 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:02 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:02 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:02 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 553.034281] IPVS: ftp: loaded support on port[0] = 21 [ 554.273472] IPVS: ftp: loaded support on port[0] = 21 [ 554.301976] IPVS: ftp: loaded support on port[0] = 21 [ 554.330676] IPVS: ftp: loaded support on port[0] = 21 [ 554.375320] IPVS: ftp: loaded support on port[0] = 21 [ 554.422084] IPVS: ftp: loaded support on port[0] = 21 [ 554.461105] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:04 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x0, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:04 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x11, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:04 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:04 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:04 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x0, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:04 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x0, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:04 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)) mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:04 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)) mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:04 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)) mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:04 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:04 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 555.325480] IPVS: ftp: loaded support on port[0] = 21 [ 556.561709] IPVS: ftp: loaded support on port[0] = 21 [ 556.587863] IPVS: ftp: loaded support on port[0] = 21 [ 556.617557] IPVS: ftp: loaded support on port[0] = 21 [ 556.657874] IPVS: ftp: loaded support on port[0] = 21 [ 556.704648] IPVS: ftp: loaded support on port[0] = 21 [ 556.750431] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:06 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:06 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:06 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x11, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:06 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:06 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:06 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:06 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:06 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:06 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:06 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 557.651144] IPVS: ftp: loaded support on port[0] = 21 [ 557.678268] IPVS: ftp: loaded support on port[0] = 21 [ 558.901739] IPVS: ftp: loaded support on port[0] = 21 [ 558.928467] IPVS: ftp: loaded support on port[0] = 21 [ 558.960780] IPVS: ftp: loaded support on port[0] = 21 [ 558.998730] IPVS: ftp: loaded support on port[0] = 21 [ 559.056077] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:08 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:08 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:08 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:08 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x11, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea2094"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:08 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:08 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:08 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:08 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:08 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:09 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:09 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 559.992335] IPVS: ftp: loaded support on port[0] = 21 [ 561.150416] IPVS: ftp: loaded support on port[0] = 21 [ 561.177547] IPVS: ftp: loaded support on port[0] = 21 [ 561.206902] IPVS: ftp: loaded support on port[0] = 21 [ 561.239555] IPVS: ftp: loaded support on port[0] = 21 [ 561.283866] IPVS: ftp: loaded support on port[0] = 21 [ 561.331889] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:11 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea2094"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:11 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:11 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="9ff13944e7656a9165ee636c07df14008911dca8940cda17f12c331a54b7a7f1f6f1e970920c69e00ff379c13a31f9896327a1a972acb829a66e3cd770e38a5a84ae316e446d86b16bf8f4d95c5e5d7f242758a2cc4a3f9d7b400a54fc99da8279a51083328e25fcae5136b29fe84c8c6ccb1c17b3ec95149f1b5dde1e687491e4fab75fc8ec36bdca2a009fb183f7ddbccd8a5d6638d68cf08c41b13d0b734dc25be1f135c9938f44892117d0800d5e2a74db33cadd0ffd9e581262184b29c8457e71f3aa320cb3178a05c083578f697d2b311df255db80038f83c8762586f54e0502dedcd46ce7f8e07c511b4a62cabd1895f6550502557120ce478e2456eb833118b12853b71ce8355d8a124814ff7c6abc33b8882d635e21ebf23f57e22349620b8e9aa21b884170e7e5c9a72929ecb3437d2b47e63f4077a652dcd1bb6cf72934b913ab210b7c95cb417a47bfdae285d76698e6309af3cb06fc8210fb9bf1268cb9fa6c82") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:11 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:11 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:11 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:11 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:11 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:11 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 562.241244] IPVS: ftp: loaded support on port[0] = 21 [ 562.267618] IPVS: ftp: loaded support on port[0] = 21 [ 563.487386] IPVS: ftp: loaded support on port[0] = 21 [ 563.513857] IPVS: ftp: loaded support on port[0] = 21 [ 563.544104] IPVS: ftp: loaded support on port[0] = 21 [ 563.576974] IPVS: ftp: loaded support on port[0] = 21 [ 563.622214] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:13 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:13 executing program 1: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:13 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:13 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea2094"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:13 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:13 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="9ff13944e7656a9165ee636c07df14008911dca8940cda17f12c331a54b7a7f1f6f1e970920c69e00ff379c13a31f9896327a1a972acb829a66e3cd770e38a5a84ae316e446d86b16bf8f4d95c5e5d7f242758a2cc4a3f9d7b400a54fc99da8279a51083328e25fcae5136b29fe84c8c6ccb1c17b3ec95149f1b5dde1e687491e4fab75fc8ec36bdca2a009fb183f7ddbccd8a5d6638d68cf08c41b13d0b734dc25be1f135c9938f44892117d0800d5e2a74db33cadd0ffd9e581262184b29c8457e71f3aa320cb3178a05c083578f697d2b311df255db80038f83c8762586f54e0502dedcd46ce7f8e07c511b4a62cabd1895f6550502557120ce478e2456eb833118b12853b71ce8355d8a124814ff7c6abc33b8882d635e21ebf23f57e22349620b8e9aa21b884170e7e5c9a72929ecb3437d2b47e63f4077a652dcd1bb6cf72934b913ab210b7c95cb417a47bfdae285d76698e6309af3cb06fc8210fb9bf1268cb9fa6c82") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:13 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:13 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:13 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:13 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:13 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:13 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:13 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:13 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 564.590416] IPVS: ftp: loaded support on port[0] = 21 [ 565.737254] IPVS: ftp: loaded support on port[0] = 21 [ 565.764933] IPVS: ftp: loaded support on port[0] = 21 [ 565.794516] IPVS: ftp: loaded support on port[0] = 21 [ 565.841604] IPVS: ftp: loaded support on port[0] = 21 [ 565.883386] IPVS: ftp: loaded support on port[0] = 21 [ 565.923458] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:15 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:15 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:15 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:15 executing program 1: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:15 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="9ff13944e7656a9165ee636c07df14008911dca8940cda17f12c331a54b7a7f1f6f1e970920c69e00ff379c13a31f9896327a1a972acb829a66e3cd770e38a5a84ae316e446d86b16bf8f4d95c5e5d7f242758a2cc4a3f9d7b400a54fc99da8279a51083328e25fcae5136b29fe84c8c6ccb1c17b3ec95149f1b5dde1e687491e4fab75fc8ec36bdca2a009fb183f7ddbccd8a5d6638d68cf08c41b13d0b734dc25be1f135c9938f44892117d0800d5e2a74db33cadd0ffd9e581262184b29c8457e71f3aa320cb3178a05c083578f697d2b311df255db80038f83c8762586f54e0502dedcd46ce7f8e07c511b4a62cabd1895f6550502557120ce478e2456eb833118b12853b71ce8355d8a124814ff7c6abc33b8882d635e21ebf23f57e22349620b8e9aa21b884170e7e5c9a72929ecb3437d2b47e63f4077a652dcd1bb6cf72934b913ab210b7c95cb417a47bfdae285d76698e6309af3cb06fc8210fb9bf1268cb9fa6c823f9d8e02b0aa") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:15 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:15 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:15 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:15 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:15 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:15 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:15 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:15 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 566.809196] IPVS: ftp: loaded support on port[0] = 21 [ 568.067185] IPVS: ftp: loaded support on port[0] = 21 [ 568.094101] IPVS: ftp: loaded support on port[0] = 21 [ 568.126893] IPVS: ftp: loaded support on port[0] = 21 [ 568.171242] IPVS: ftp: loaded support on port[0] = 21 [ 568.209103] IPVS: ftp: loaded support on port[0] = 21 [ 568.240916] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:17 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:17 executing program 1: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00'}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:17 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:17 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="9ff13944e7656a9165ee636c07df14008911dca8940cda17f12c331a54b7a7f1f6f1e970920c69e00ff379c13a31f9896327a1a972acb829a66e3cd770e38a5a84ae316e446d86b16bf8f4d95c5e5d7f242758a2cc4a3f9d7b400a54fc99da8279a51083328e25fcae5136b29fe84c8c6ccb1c17b3ec95149f1b5dde1e687491e4fab75fc8ec36bdca2a009fb183f7ddbccd8a5d6638d68cf08c41b13d0b734dc25be1f135c9938f44892117d0800d5e2a74db33cadd0ffd9e581262184b29c8457e71f3aa320cb3178a05c083578f697d2b311df255db80038f83c8762586f54e0502dedcd46ce7f8e07c511b4a62cabd1895f6550502557120ce478e2456eb833118b12853b71ce8355d8a124814ff7c6abc33b8882d635e21ebf23f57e22349620b8e9aa21b884170e7e5c9a72929ecb3437d2b47e63f4077a652dcd1bb6cf72934b913ab210b7c95cb417a47bfdae285d76698e6309af3cb06fc8210fb9bf1268cb9fa6c823f9d8e02b0aa") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:17 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:18 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:18 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:18 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:18 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:18 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:18 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:18 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 569.132467] IPVS: ftp: loaded support on port[0] = 21 [ 570.352138] IPVS: ftp: loaded support on port[0] = 21 [ 570.380975] IPVS: ftp: loaded support on port[0] = 21 [ 570.413679] IPVS: ftp: loaded support on port[0] = 21 [ 570.457712] IPVS: ftp: loaded support on port[0] = 21 [ 570.487796] IPVS: ftp: loaded support on port[0] = 21 [ 570.539400] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:20 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:20 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:20 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd2824982"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:20 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:20 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea2094"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:20 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:20 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:20 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:20 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:20 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:20 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:20 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 571.409679] IPVS: ftp: loaded support on port[0] = 21 [ 572.651883] IPVS: ftp: loaded support on port[0] = 21 [ 572.678048] IPVS: ftp: loaded support on port[0] = 21 [ 572.707725] IPVS: ftp: loaded support on port[0] = 21 [ 572.757393] IPVS: ftp: loaded support on port[0] = 21 [ 572.797118] IPVS: ftp: loaded support on port[0] = 21 [ 572.829910] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:22 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x0, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd2824982"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:22 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:22 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea2094"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:22 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:22 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x0, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:22 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x0, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:22 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)) 2018/03/29 10:49:22 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)) 2018/03/29 10:49:22 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)) 2018/03/29 10:49:22 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd") 2018/03/29 10:49:22 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd") [ 573.735610] IPVS: ftp: loaded support on port[0] = 21 [ 574.969748] IPVS: ftp: loaded support on port[0] = 21 [ 574.997910] IPVS: ftp: loaded support on port[0] = 21 [ 575.027984] IPVS: ftp: loaded support on port[0] = 21 [ 575.070065] IPVS: ftp: loaded support on port[0] = 21 [ 575.117635] IPVS: ftp: loaded support on port[0] = 21 [ 575.162838] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:24 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd") 2018/03/29 10:49:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:24 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd2824982"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:24 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea2094"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:24 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:24 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:24 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e") 2018/03/29 10:49:24 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e") 2018/03/29 10:49:25 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e") 2018/03/29 10:49:25 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20") 2018/03/29 10:49:25 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20") 2018/03/29 10:49:25 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20") 2018/03/29 10:49:25 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780") [ 576.053281] IPVS: ftp: loaded support on port[0] = 21 [ 577.275145] IPVS: ftp: loaded support on port[0] = 21 [ 577.302673] IPVS: ftp: loaded support on port[0] = 21 [ 577.331610] IPVS: ftp: loaded support on port[0] = 21 [ 577.380497] IPVS: ftp: loaded support on port[0] = 21 [ 577.421482] IPVS: ftp: loaded support on port[0] = 21 [ 577.463353] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:27 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780") 2018/03/29 10:49:27 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x11, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:27 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:27 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:27 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780") 2018/03/29 10:49:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:27 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b5610888") 2018/03/29 10:49:27 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b5610888") 2018/03/29 10:49:27 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b5610888") 2018/03/29 10:49:27 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281") 2018/03/29 10:49:27 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281") 2018/03/29 10:49:27 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281") [ 578.339447] IPVS: ftp: loaded support on port[0] = 21 [ 579.570930] IPVS: ftp: loaded support on port[0] = 21 [ 579.597422] IPVS: ftp: loaded support on port[0] = 21 [ 579.630270] IPVS: ftp: loaded support on port[0] = 21 [ 579.671428] IPVS: ftp: loaded support on port[0] = 21 [ 579.710035] IPVS: ftp: loaded support on port[0] = 21 [ 579.743789] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x11, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:29 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:29 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:29 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:29 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c7") 2018/03/29 10:49:29 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:29 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c7") 2018/03/29 10:49:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:29 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c7") 2018/03/29 10:49:29 executing program 4 (fault-call:12 fault-nth:0): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 580.245624] FAULT_INJECTION: forcing a failure. [ 580.245624] name failslab, interval 1, probability 0, space 0, times 0 [ 580.256885] CPU: 0 PID: 26143 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 580.264147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.273487] Call Trace: [ 580.276068] dump_stack+0x194/0x24d [ 580.279691] ? arch_local_irq_restore+0x53/0x53 [ 580.284372] should_fail+0x8c0/0xa40 [ 580.288083] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 580.293179] ? lock_downgrade+0x980/0x980 [ 580.297319] ? get_pid_task+0xbc/0x140 [ 580.301200] ? proc_fail_nth_write+0x9b/0x1d0 [ 580.305688] ? map_files_get_link+0x3a0/0x3a0 [ 580.310179] ? find_held_lock+0x35/0x1d0 [ 580.314268] ? check_same_owner+0x320/0x320 [ 580.318573] ? __lock_is_held+0xb6/0x140 [ 580.322625] ? rcu_note_context_switch+0x710/0x710 [ 580.327556] should_failslab+0xec/0x120 [ 580.331537] __kmalloc_track_caller+0x5f/0x760 [ 580.336117] ? strncpy_from_user+0x430/0x430 [ 580.340509] ? strndup_user+0x62/0xb0 [ 580.344308] memdup_user+0x2c/0x90 [ 580.347840] strndup_user+0x62/0xb0 [ 580.351461] SyS_mount+0x3c/0x120 [ 580.354902] ? copy_mnt_ns+0xb30/0xb30 [ 580.358783] do_syscall_64+0x281/0x940 [ 580.362658] ? __do_page_fault+0xc90/0xc90 [ 580.366877] ? _raw_spin_unlock_irq+0x27/0x70 [ 580.371361] ? finish_task_switch+0x1c1/0x7e0 [ 580.375846] ? syscall_return_slowpath+0x550/0x550 [ 580.380763] ? syscall_return_slowpath+0x2ac/0x550 [ 580.385681] ? prepare_exit_to_usermode+0x350/0x350 [ 580.390686] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 580.396046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 580.400895] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 580.406071] RIP: 0033:0x4548b9 [ 580.409243] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 580.416939] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 580.424194] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 580.431450] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 580.438707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/29 10:49:30 executing program 4 (fault-call:12 fault-nth:1): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 580.445961] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000000 [ 580.610449] FAULT_INJECTION: forcing a failure. [ 580.610449] name failslab, interval 1, probability 0, space 0, times 0 [ 580.621733] CPU: 0 PID: 26145 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 580.628997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.638339] Call Trace: [ 580.640910] dump_stack+0x194/0x24d [ 580.644522] ? arch_local_irq_restore+0x53/0x53 [ 580.649184] ? __save_stack_trace+0x7e/0xd0 [ 580.653497] should_fail+0x8c0/0xa40 [ 580.657191] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 580.662271] ? kasan_kmalloc+0xad/0xe0 [ 580.666136] ? __kmalloc_track_caller+0x15e/0x760 [ 580.670958] ? memdup_user+0x2c/0x90 [ 580.674644] ? strndup_user+0x62/0xb0 [ 580.678420] ? SyS_mount+0x3c/0x120 [ 580.682034] ? proc_fail_nth_write+0x9b/0x1d0 [ 580.686512] ? map_files_get_link+0x3a0/0x3a0 [ 580.690986] ? find_held_lock+0x35/0x1d0 [ 580.695054] ? check_same_owner+0x320/0x320 [ 580.699355] ? rcu_note_context_switch+0x710/0x710 [ 580.704267] ? __check_object_size+0x8b/0x530 [ 580.708742] should_failslab+0xec/0x120 [ 580.712690] __kmalloc_track_caller+0x5f/0x760 [ 580.717251] ? strncpy_from_user+0x430/0x430 [ 580.721653] ? strndup_user+0x62/0xb0 [ 580.725427] ? _copy_from_user+0x99/0x110 [ 580.729553] memdup_user+0x2c/0x90 [ 580.733068] strndup_user+0x62/0xb0 [ 580.736672] SyS_mount+0x6b/0x120 [ 580.740100] ? copy_mnt_ns+0xb30/0xb30 [ 580.743963] do_syscall_64+0x281/0x940 [ 580.747822] ? __do_page_fault+0xc90/0xc90 [ 580.752034] ? _raw_spin_unlock_irq+0x27/0x70 [ 580.756503] ? finish_task_switch+0x1c1/0x7e0 [ 580.760971] ? syscall_return_slowpath+0x550/0x550 [ 580.765875] ? syscall_return_slowpath+0x2ac/0x550 [ 580.770779] ? prepare_exit_to_usermode+0x350/0x350 [ 580.775770] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 580.781111] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 580.785934] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 580.791096] RIP: 0033:0x4548b9 [ 580.794259] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 580.801941] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 2018/03/29 10:49:30 executing program 4 (fault-call:12 fault-nth:2): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 580.809187] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 580.816432] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 580.823673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 580.830916] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000001 [ 580.906776] FAULT_INJECTION: forcing a failure. [ 580.906776] name failslab, interval 1, probability 0, space 0, times 0 [ 580.918049] CPU: 1 PID: 26147 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 580.925311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.934650] Call Trace: [ 580.937233] dump_stack+0x194/0x24d [ 580.940855] ? arch_local_irq_restore+0x53/0x53 [ 580.945536] should_fail+0x8c0/0xa40 [ 580.949244] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 580.954332] ? __kmalloc_track_caller+0x15e/0x760 [ 580.959160] ? strndup_user+0x62/0xb0 [ 580.962949] ? SyS_mount+0x6b/0x120 [ 580.966573] ? trace_hardirqs_off+0x10/0x10 [ 580.970895] ? proc_fail_nth_write+0x9b/0x1d0 [ 580.972691] IPVS: ftp: loaded support on port[0] = 21 [ 580.975383] ? map_files_get_link+0x3a0/0x3a0 [ 580.975409] ? find_held_lock+0x35/0x1d0 [ 580.975450] ? check_same_owner+0x320/0x320 [ 580.994019] ? lock_release+0xa40/0xa40 [ 580.997992] ? check_same_owner+0x320/0x320 [ 581.002314] ? rcu_note_context_switch+0x710/0x710 [ 581.007254] should_failslab+0xec/0x120 [ 581.011227] kmem_cache_alloc_trace+0x4b/0x740 [ 581.015811] ? kasan_check_write+0x14/0x20 [ 581.020039] ? _copy_from_user+0x99/0x110 [ 581.024193] copy_mount_options+0x5f/0x2e0 [ 581.028430] SyS_mount+0x87/0x120 [ 581.030921] IPVS: ftp: loaded support on port[0] = 21 [ 581.031873] ? copy_mnt_ns+0xb30/0xb30 [ 581.031889] do_syscall_64+0x281/0x940 [ 581.031898] ? __do_page_fault+0xc90/0xc90 [ 581.049021] ? _raw_spin_unlock_irq+0x27/0x70 [ 581.053521] ? finish_task_switch+0x1c1/0x7e0 [ 581.058018] ? syscall_return_slowpath+0x550/0x550 [ 581.062953] ? syscall_return_slowpath+0x2ac/0x550 [ 581.067883] ? prepare_exit_to_usermode+0x350/0x350 [ 581.072900] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 581.078269] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 581.083123] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 581.088307] RIP: 0033:0x4548b9 [ 581.091487] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 581.092245] IPVS: ftp: loaded support on port[0] = 21 [ 581.099195] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 581.099202] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 581.099207] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 581.099215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 581.099222] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000002 [ 582.376681] IPVS: ftp: loaded support on port[0] = 21 [ 582.403238] IPVS: ftp: loaded support on port[0] = 21 [ 582.436859] IPVS: ftp: loaded support on port[0] = 21 [ 582.475292] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:32 executing program 4 (fault-call:12 fault-nth:3): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:32 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd2824982"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x11, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:32 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:32 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 582.602746] FAULT_INJECTION: forcing a failure. [ 582.602746] name failslab, interval 1, probability 0, space 0, times 0 [ 582.614127] CPU: 1 PID: 26175 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 582.621396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.630744] Call Trace: [ 582.633333] dump_stack+0x194/0x24d [ 582.636963] ? arch_local_irq_restore+0x53/0x53 [ 582.641642] should_fail+0x8c0/0xa40 [ 582.645356] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 582.650454] ? lock_release+0xa40/0xa40 [ 582.654434] ? find_held_lock+0x35/0x1d0 [ 582.658514] ? check_same_owner+0x320/0x320 [ 582.662833] ? rcu_note_context_switch+0x710/0x710 [ 582.667763] should_failslab+0xec/0x120 [ 582.671728] kmem_cache_alloc+0x47/0x760 [ 582.675778] ? map_files_get_link+0x3a0/0x3a0 [ 582.680283] getname_flags+0xcb/0x580 [ 582.684088] user_path_at_empty+0x2d/0x50 [ 582.688234] do_mount+0x15f/0x2bb0 [ 582.691780] ? copy_mount_string+0x40/0x40 [ 582.696009] ? rcu_pm_notify+0xc0/0xc0 [ 582.699901] ? copy_mount_options+0x5f/0x2e0 [ 582.704302] ? rcu_read_lock_sched_held+0x108/0x120 [ 582.709308] ? kmem_cache_alloc_trace+0x459/0x740 [ 582.714218] ? kasan_check_write+0x14/0x20 [ 582.718442] ? _copy_from_user+0x99/0x110 [ 582.722586] ? copy_mount_options+0x1f7/0x2e0 [ 582.727081] SyS_mount+0xab/0x120 [ 582.730521] ? copy_mnt_ns+0xb30/0xb30 [ 582.734402] do_syscall_64+0x281/0x940 [ 582.738275] ? __do_page_fault+0xc90/0xc90 [ 582.742498] ? _raw_spin_unlock_irq+0x27/0x70 [ 582.746982] ? finish_task_switch+0x1c1/0x7e0 [ 582.751470] ? syscall_return_slowpath+0x550/0x550 [ 582.756480] ? syscall_return_slowpath+0x2ac/0x550 [ 582.761402] ? prepare_exit_to_usermode+0x350/0x350 [ 582.766406] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 582.771766] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 582.776613] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 582.781777] RIP: 0033:0x4548b9 [ 582.784942] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 582.792623] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 2018/03/29 10:49:32 executing program 4 (fault-call:12 fault-nth:4): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 582.799865] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 582.807115] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 582.814360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 582.821605] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000003 [ 582.857477] FAULT_INJECTION: forcing a failure. [ 582.857477] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 582.869304] CPU: 1 PID: 26179 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 582.876549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.885883] Call Trace: [ 582.888462] dump_stack+0x194/0x24d [ 582.892074] ? arch_local_irq_restore+0x53/0x53 [ 582.896733] should_fail+0x8c0/0xa40 [ 582.900425] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 582.905511] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 582.910691] ? find_held_lock+0x35/0x1d0 [ 582.914730] ? trace_hardirqs_off+0x10/0x10 [ 582.919034] ? __is_insn_slot_addr+0x1fc/0x330 [ 582.923594] ? lock_downgrade+0x980/0x980 [ 582.927736] ? find_held_lock+0x35/0x1d0 [ 582.931782] ? should_fail+0x23b/0xa40 [ 582.935646] ? is_bpf_text_address+0x7b/0x120 [ 582.940126] __alloc_pages_nodemask+0x327/0xdd0 [ 582.944769] ? lock_release+0xa40/0xa40 [ 582.948727] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 582.953725] ? find_held_lock+0x35/0x1d0 [ 582.957788] ? check_same_owner+0x320/0x320 [ 582.962093] cache_grow_begin+0x72/0x640 [ 582.966138] kmem_cache_alloc+0x400/0x760 [ 582.970264] ? map_files_get_link+0x3a0/0x3a0 [ 582.974745] getname_flags+0xcb/0x580 [ 582.978526] user_path_at_empty+0x2d/0x50 [ 582.982655] do_mount+0x15f/0x2bb0 [ 582.986180] ? copy_mount_string+0x40/0x40 [ 582.991066] ? rcu_pm_notify+0xc0/0xc0 [ 582.994943] ? copy_mount_options+0x5f/0x2e0 [ 582.999328] ? rcu_read_lock_sched_held+0x108/0x120 [ 583.004321] ? kmem_cache_alloc_trace+0x459/0x740 [ 583.009142] ? kasan_check_write+0x14/0x20 [ 583.013354] ? _copy_from_user+0x99/0x110 [ 583.017485] ? copy_mount_options+0x1f7/0x2e0 [ 583.021962] SyS_mount+0xab/0x120 [ 583.025394] ? copy_mnt_ns+0xb30/0xb30 [ 583.029261] do_syscall_64+0x281/0x940 [ 583.033125] ? __do_page_fault+0xc90/0xc90 [ 583.037340] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 583.042853] ? syscall_return_slowpath+0x550/0x550 [ 583.047758] ? syscall_return_slowpath+0x2ac/0x550 [ 583.052678] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 583.058200] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 583.063030] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 583.068193] RIP: 0033:0x4548b9 [ 583.071357] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 583.079042] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 583.086286] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 583.093532] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 583.100779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/29 10:49:32 executing program 4 (fault-call:12 fault-nth:5): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 583.108024] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 [ 583.147909] FAULT_INJECTION: forcing a failure. [ 583.147909] name failslab, interval 1, probability 0, space 0, times 0 [ 583.159513] CPU: 0 PID: 26182 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 583.166760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.176093] Call Trace: [ 583.178667] dump_stack+0x194/0x24d [ 583.182276] ? arch_local_irq_restore+0x53/0x53 [ 583.186924] ? __kernel_text_address+0xd/0x40 [ 583.191404] should_fail+0x8c0/0xa40 [ 583.195100] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 583.200182] ? save_stack+0xa3/0xd0 [ 583.203783] ? save_stack+0x43/0xd0 [ 583.207383] ? kasan_kmalloc+0xad/0xe0 [ 583.211245] ? kasan_slab_alloc+0x12/0x20 [ 583.215370] ? kmem_cache_alloc+0x12e/0x760 [ 583.219666] ? alloc_vfsmnt+0xe0/0x9c0 [ 583.223527] ? vfs_kern_mount.part.26+0x84/0x4a0 [ 583.228264] ? do_mount+0xea4/0x2bb0 [ 583.231958] ? find_held_lock+0x35/0x1d0 [ 583.236031] ? check_same_owner+0x320/0x320 [ 583.240334] ? rcu_note_context_switch+0x710/0x710 [ 583.245264] should_failslab+0xec/0x120 [ 583.249215] __kmalloc_track_caller+0x5f/0x760 [ 583.253776] ? do_raw_spin_trylock+0x190/0x190 [ 583.258331] ? kstrdup_const+0x39/0x50 [ 583.262200] kstrdup+0x39/0x70 [ 583.265368] kstrdup_const+0x39/0x50 [ 583.269059] alloc_vfsmnt+0x1a5/0x9c0 [ 583.272838] ? path_lookupat+0x238/0xba0 [ 583.276872] ? mnt_free_id.isra.21+0x50/0x50 [ 583.281264] ? trace_hardirqs_off+0x10/0x10 [ 583.285563] ? putname+0xee/0x130 [ 583.288996] ? putname+0xee/0x130 [ 583.292428] ? rcu_read_lock_sched_held+0x108/0x120 [ 583.297423] ? find_held_lock+0x35/0x1d0 [ 583.301477] ? __get_fs_type+0x8a/0xc0 [ 583.305340] ? lock_downgrade+0x980/0x980 [ 583.309468] ? module_unload_free+0x5b0/0x5b0 [ 583.313942] ? lock_release+0xa40/0xa40 [ 583.317895] ? mpi_resize+0x200/0x200 [ 583.321680] vfs_kern_mount.part.26+0x84/0x4a0 [ 583.326243] ? may_umount+0xa0/0xa0 [ 583.329848] ? _raw_read_unlock+0x22/0x30 [ 583.333972] ? __get_fs_type+0x8a/0xc0 [ 583.337842] do_mount+0xea4/0x2bb0 [ 583.341375] ? copy_mount_string+0x40/0x40 [ 583.345588] ? rcu_pm_notify+0xc0/0xc0 [ 583.349461] ? copy_mount_options+0x5f/0x2e0 [ 583.353846] ? rcu_read_lock_sched_held+0x108/0x120 [ 583.358837] ? kmem_cache_alloc_trace+0x459/0x740 [ 583.363656] ? kasan_check_write+0x14/0x20 [ 583.367867] ? _copy_from_user+0x99/0x110 [ 583.371997] ? copy_mount_options+0x1f7/0x2e0 [ 583.376477] SyS_mount+0xab/0x120 [ 583.379903] ? copy_mnt_ns+0xb30/0xb30 [ 583.383768] do_syscall_64+0x281/0x940 [ 583.387631] ? __do_page_fault+0xc90/0xc90 [ 583.391850] ? _raw_spin_unlock_irq+0x27/0x70 [ 583.396320] ? finish_task_switch+0x1c1/0x7e0 [ 583.400790] ? syscall_return_slowpath+0x550/0x550 [ 583.405697] ? syscall_return_slowpath+0x2ac/0x550 [ 583.410605] ? prepare_exit_to_usermode+0x350/0x350 [ 583.415596] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 583.420938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 583.425763] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 583.430924] RIP: 0033:0x4548b9 [ 583.434090] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 583.441773] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 583.449024] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/03/29 10:49:33 executing program 4 (fault-call:12 fault-nth:6): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 583.456278] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 583.463521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 583.470765] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000005 [ 583.508627] FAULT_INJECTION: forcing a failure. [ 583.508627] name failslab, interval 1, probability 0, space 0, times 0 [ 583.519909] CPU: 1 PID: 26185 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 583.527161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.536502] Call Trace: [ 583.539073] dump_stack+0x194/0x24d [ 583.542684] ? arch_local_irq_restore+0x53/0x53 [ 583.547335] ? __kernel_text_address+0xd/0x40 [ 583.551815] should_fail+0x8c0/0xa40 [ 583.555509] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 583.560593] ? save_stack+0xa3/0xd0 [ 583.564198] ? save_stack+0x43/0xd0 [ 583.567800] ? kasan_kmalloc+0xad/0xe0 [ 583.571663] ? kasan_slab_alloc+0x12/0x20 [ 583.575783] ? kmem_cache_alloc+0x12e/0x760 [ 583.580081] ? alloc_vfsmnt+0xe0/0x9c0 [ 583.583941] ? vfs_kern_mount.part.26+0x84/0x4a0 [ 583.588669] ? do_mount+0xea4/0x2bb0 [ 583.592363] ? find_held_lock+0x35/0x1d0 [ 583.596425] ? check_same_owner+0x320/0x320 [ 583.600729] ? rcu_note_context_switch+0x710/0x710 [ 583.605644] should_failslab+0xec/0x120 [ 583.609596] __kmalloc_track_caller+0x5f/0x760 [ 583.614160] ? do_raw_spin_trylock+0x190/0x190 [ 583.618720] ? kstrdup_const+0x39/0x50 [ 583.622590] kstrdup+0x39/0x70 [ 583.625762] kstrdup_const+0x39/0x50 [ 583.629455] alloc_vfsmnt+0x1a5/0x9c0 [ 583.633232] ? path_lookupat+0x238/0xba0 [ 583.637269] ? mnt_free_id.isra.21+0x50/0x50 [ 583.641659] ? trace_hardirqs_off+0x10/0x10 [ 583.645958] ? putname+0xee/0x130 [ 583.649392] ? putname+0xee/0x130 [ 583.652823] ? rcu_read_lock_sched_held+0x108/0x120 [ 583.657820] ? find_held_lock+0x35/0x1d0 [ 583.661862] ? __get_fs_type+0x8a/0xc0 [ 583.665730] ? lock_downgrade+0x980/0x980 [ 583.669857] ? module_unload_free+0x5b0/0x5b0 [ 583.674328] ? lock_release+0xa40/0xa40 [ 583.678300] ? mpi_resize+0x200/0x200 [ 583.682084] vfs_kern_mount.part.26+0x84/0x4a0 [ 583.686643] ? may_umount+0xa0/0xa0 [ 583.690256] ? _raw_read_unlock+0x22/0x30 [ 583.694379] ? __get_fs_type+0x8a/0xc0 [ 583.698252] do_mount+0xea4/0x2bb0 [ 583.701776] ? copy_mount_string+0x40/0x40 [ 583.705989] ? rcu_pm_notify+0xc0/0xc0 [ 583.709868] ? copy_mount_options+0x5f/0x2e0 [ 583.714260] ? rcu_read_lock_sched_held+0x108/0x120 [ 583.719251] ? kmem_cache_alloc_trace+0x459/0x740 [ 583.724073] ? kasan_check_write+0x14/0x20 [ 583.728286] ? _copy_from_user+0x99/0x110 [ 583.732414] ? copy_mount_options+0x1f7/0x2e0 [ 583.736892] SyS_mount+0xab/0x120 [ 583.740319] ? copy_mnt_ns+0xb30/0xb30 [ 583.744184] do_syscall_64+0x281/0x940 [ 583.748045] ? __do_page_fault+0xc90/0xc90 [ 583.752253] ? _raw_spin_unlock_irq+0x27/0x70 [ 583.756726] ? finish_task_switch+0x1c1/0x7e0 [ 583.761198] ? syscall_return_slowpath+0x550/0x550 [ 583.766106] ? syscall_return_slowpath+0x2ac/0x550 [ 583.771020] ? prepare_exit_to_usermode+0x350/0x350 [ 583.776021] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 583.781366] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 583.786191] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 583.791365] RIP: 0033:0x4548b9 [ 583.794528] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 583.802210] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 583.809454] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 583.816701] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 583.823945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 583.831190] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 2018/03/29 10:49:33 executing program 4 (fault-call:12 fault-nth:7): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 583.933882] FAULT_INJECTION: forcing a failure. [ 583.933882] name failslab, interval 1, probability 0, space 0, times 0 [ 583.945161] CPU: 1 PID: 26196 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 583.952420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.961756] Call Trace: [ 583.964335] dump_stack+0x194/0x24d [ 583.967954] ? arch_local_irq_restore+0x53/0x53 [ 583.972611] ? __kernel_text_address+0xd/0x40 [ 583.977110] should_fail+0x8c0/0xa40 [ 583.980817] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 583.985916] ? save_stack+0xa3/0xd0 [ 583.989531] ? save_stack+0x43/0xd0 [ 583.993141] ? kasan_kmalloc+0xad/0xe0 [ 583.997015] ? kasan_slab_alloc+0x12/0x20 [ 584.001149] ? kmem_cache_alloc+0x12e/0x760 [ 584.005457] ? alloc_vfsmnt+0xe0/0x9c0 [ 584.009326] ? vfs_kern_mount.part.26+0x84/0x4a0 [ 584.014062] ? do_mount+0xea4/0x2bb0 [ 584.017767] ? find_held_lock+0x35/0x1d0 [ 584.021850] ? check_same_owner+0x320/0x320 [ 584.026168] ? rcu_note_context_switch+0x710/0x710 [ 584.031098] should_failslab+0xec/0x120 [ 584.035061] __kmalloc_track_caller+0x5f/0x760 [ 584.039635] ? do_raw_spin_trylock+0x190/0x190 [ 584.044201] ? kstrdup_const+0x39/0x50 [ 584.048086] kstrdup+0x39/0x70 [ 584.051269] kstrdup_const+0x39/0x50 [ 584.054970] alloc_vfsmnt+0x1a5/0x9c0 [ 584.058757] ? path_lookupat+0x238/0xba0 [ 584.062804] ? mnt_free_id.isra.21+0x50/0x50 [ 584.067205] ? trace_hardirqs_off+0x10/0x10 [ 584.071520] ? putname+0xee/0x130 [ 584.074967] ? putname+0xee/0x130 [ 584.078406] ? rcu_read_lock_sched_held+0x108/0x120 [ 584.083415] ? find_held_lock+0x35/0x1d0 [ 584.087480] ? __get_fs_type+0x8a/0xc0 [ 584.091358] ? lock_downgrade+0x980/0x980 [ 584.095492] ? module_unload_free+0x5b0/0x5b0 [ 584.099979] ? lock_release+0xa40/0xa40 [ 584.103973] ? mpi_resize+0x200/0x200 [ 584.107773] vfs_kern_mount.part.26+0x84/0x4a0 [ 584.112346] ? may_umount+0xa0/0xa0 [ 584.115961] ? _raw_read_unlock+0x22/0x30 [ 584.120094] ? __get_fs_type+0x8a/0xc0 [ 584.123981] do_mount+0xea4/0x2bb0 [ 584.127521] ? copy_mount_string+0x40/0x40 [ 584.131742] ? rcu_pm_notify+0xc0/0xc0 [ 584.135631] ? copy_mount_options+0x5f/0x2e0 [ 584.140024] ? rcu_read_lock_sched_held+0x108/0x120 [ 584.145030] ? kmem_cache_alloc_trace+0x459/0x740 [ 584.149863] ? kasan_check_write+0x14/0x20 [ 584.154097] ? copy_mount_options+0x1f7/0x2e0 [ 584.158590] SyS_mount+0xab/0x120 [ 584.162034] ? copy_mnt_ns+0xb30/0xb30 [ 584.165911] do_syscall_64+0x281/0x940 [ 584.169784] ? __do_page_fault+0xc90/0xc90 [ 584.174021] ? _raw_spin_unlock_irq+0x27/0x70 [ 584.178503] ? finish_task_switch+0x1c1/0x7e0 [ 584.182989] ? syscall_return_slowpath+0x550/0x550 [ 584.187909] ? syscall_return_slowpath+0x2ac/0x550 [ 584.192830] ? prepare_exit_to_usermode+0x350/0x350 [ 584.197837] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 584.203196] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 584.208038] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 584.213213] RIP: 0033:0x4548b9 [ 584.216386] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 584.224082] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 2018/03/29 10:49:33 executing program 4 (fault-call:12 fault-nth:8): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 584.231339] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 584.238594] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 584.245847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 584.253100] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 [ 584.491179] FAULT_INJECTION: forcing a failure. [ 584.491179] name failslab, interval 1, probability 0, space 0, times 0 [ 584.502474] CPU: 1 PID: 26202 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 584.509762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.519142] Call Trace: [ 584.521729] dump_stack+0x194/0x24d [ 584.525355] ? arch_local_irq_restore+0x53/0x53 [ 584.530021] ? wait_for_completion+0x770/0x770 [ 584.534609] should_fail+0x8c0/0xa40 [ 584.538320] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 584.543422] ? rcu_pm_notify+0xc0/0xc0 [ 584.547324] ? find_held_lock+0x35/0x1d0 [ 584.551410] ? check_same_owner+0x320/0x320 [ 584.555719] ? sget_userns+0x27d/0xe40 [ 584.559596] ? rcu_note_context_switch+0x710/0x710 [ 584.564525] should_failslab+0xec/0x120 [ 584.568485] kmem_cache_alloc_trace+0x4b/0x740 [ 584.573053] ? security_capable+0x8e/0xc0 [ 584.577208] sget_userns+0x2a3/0xe40 [ 584.580909] ? set_anon_super+0x20/0x20 [ 584.584879] ? put_filp+0x90/0x90 [ 584.588320] ? destroy_unused_super.part.6+0xd0/0xd0 [ 584.593418] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 584.598426] ? trace_hardirqs_off+0x10/0x10 [ 584.602725] ? putname+0xee/0x130 [ 584.606156] ? cap_capable+0x1b5/0x230 [ 584.610033] ? security_capable+0x8e/0xc0 [ 584.614167] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 584.619329] ? ns_capable_common+0xcf/0x160 [ 584.623630] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 584.628794] mount_ns+0x6d/0x190 [ 584.632139] rpc_mount+0x9e/0xd0 [ 584.635480] mount_fs+0x66/0x2d0 [ 584.638825] vfs_kern_mount.part.26+0xc6/0x4a0 [ 584.643382] ? may_umount+0xa0/0xa0 [ 584.646991] ? _raw_read_unlock+0x22/0x30 [ 584.651119] ? __get_fs_type+0x8a/0xc0 [ 584.654987] do_mount+0xea4/0x2bb0 [ 584.658507] ? copy_mount_string+0x40/0x40 [ 584.662718] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 584.667710] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 584.672445] ? retint_kernel+0x10/0x10 [ 584.676318] ? copy_mount_options+0x175/0x2e0 [ 584.680786] ? copy_mount_options+0x1f7/0x2e0 [ 584.685259] SyS_mount+0xab/0x120 [ 584.688690] ? copy_mnt_ns+0xb30/0xb30 [ 584.692551] do_syscall_64+0x281/0x940 [ 584.696411] ? __do_page_fault+0xc90/0xc90 [ 584.700623] ? _raw_spin_unlock_irq+0x27/0x70 [ 584.705103] ? finish_task_switch+0x1c1/0x7e0 [ 584.709572] ? syscall_return_slowpath+0x550/0x550 [ 584.714486] ? syscall_return_slowpath+0x2ac/0x550 [ 584.719390] ? prepare_exit_to_usermode+0x350/0x350 [ 584.724381] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 584.729723] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 584.734545] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 10:49:34 executing program 4 (fault-call:12 fault-nth:9): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 584.739713] RIP: 0033:0x4548b9 [ 584.742876] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 584.750566] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 584.757810] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 584.765055] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 584.772298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 584.779543] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 [ 584.817592] FAULT_INJECTION: forcing a failure. [ 584.817592] name failslab, interval 1, probability 0, space 0, times 0 [ 584.829052] CPU: 1 PID: 26204 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 584.836311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.845648] Call Trace: [ 584.848226] dump_stack+0x194/0x24d [ 584.851857] ? arch_local_irq_restore+0x53/0x53 [ 584.856520] ? kernel_text_address+0x102/0x140 [ 584.861109] should_fail+0x8c0/0xa40 [ 584.864817] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 584.869927] ? save_stack+0x43/0xd0 [ 584.873543] ? kasan_kmalloc+0xad/0xe0 [ 584.877412] ? __kmalloc+0x162/0x760 [ 584.881118] ? __list_lru_init+0xcf/0x750 [ 584.885267] ? find_held_lock+0x35/0x1d0 [ 584.889406] ? __lock_is_held+0xb6/0x140 [ 584.893505] ? check_same_owner+0x320/0x320 [ 584.897823] ? rcu_note_context_switch+0x710/0x710 [ 584.902756] should_failslab+0xec/0x120 [ 584.906756] kmem_cache_alloc_node_trace+0x5a/0x760 [ 584.911792] ? mark_held_locks+0xaf/0x100 [ 584.915929] ? __raw_spin_lock_init+0x1c/0x100 [ 584.920576] __kmalloc_node+0x33/0x70 [ 584.924374] kvmalloc_node+0x99/0xd0 [ 584.928081] __list_lru_init+0x5d5/0x750 [ 584.932144] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 584.938019] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 584.943036] ? __lockdep_init_map+0xe4/0x650 [ 584.947437] ? lockdep_init_map+0x9/0x10 [ 584.951490] sget_userns+0x691/0xe40 [ 584.955189] ? set_anon_super+0x20/0x20 [ 584.959162] ? put_filp+0x90/0x90 [ 584.962608] ? destroy_unused_super.part.6+0xd0/0xd0 [ 584.967704] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 584.972717] ? trace_hardirqs_off+0x10/0x10 [ 584.977029] ? putname+0xee/0x130 [ 584.980479] ? cap_capable+0x1b5/0x230 [ 584.984362] ? security_capable+0x8e/0xc0 [ 584.988506] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 584.994385] ? ns_capable_common+0xcf/0x160 [ 584.998706] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 585.003881] mount_ns+0x6d/0x190 [ 585.007243] rpc_mount+0x9e/0xd0 [ 585.010606] mount_fs+0x66/0x2d0 [ 585.013972] vfs_kern_mount.part.26+0xc6/0x4a0 [ 585.018541] ? may_umount+0xa0/0xa0 [ 585.022152] ? _raw_read_unlock+0x22/0x30 [ 585.026284] ? __get_fs_type+0x8a/0xc0 [ 585.030155] do_mount+0xea4/0x2bb0 [ 585.033677] ? copy_mount_string+0x40/0x40 [ 585.037886] ? rcu_pm_notify+0xc0/0xc0 [ 585.041765] ? copy_mount_options+0x5f/0x2e0 [ 585.046157] ? rcu_read_lock_sched_held+0x108/0x120 [ 585.051150] ? kmem_cache_alloc_trace+0x459/0x740 [ 585.055967] ? kasan_check_write+0x14/0x20 [ 585.060176] ? _copy_from_user+0x99/0x110 [ 585.064305] ? copy_mount_options+0x1f7/0x2e0 [ 585.068782] SyS_mount+0xab/0x120 [ 585.072210] ? copy_mnt_ns+0xb30/0xb30 [ 585.076078] do_syscall_64+0x281/0x940 [ 585.079939] ? __do_page_fault+0xc90/0xc90 [ 585.084147] ? _raw_spin_unlock_irq+0x27/0x70 [ 585.088616] ? finish_task_switch+0x1c1/0x7e0 [ 585.093090] ? syscall_return_slowpath+0x550/0x550 [ 585.097995] ? syscall_return_slowpath+0x2ac/0x550 [ 585.102915] ? prepare_exit_to_usermode+0x350/0x350 [ 585.107908] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 585.113256] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 585.118081] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 585.123242] RIP: 0033:0x4548b9 [ 585.126413] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 585.134095] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 585.141338] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 585.148582] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 585.155824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 2018/03/29 10:49:34 executing program 4 (fault-call:12 fault-nth:10): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 585.163073] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 [ 585.209290] FAULT_INJECTION: forcing a failure. [ 585.209290] name failslab, interval 1, probability 0, space 0, times 0 [ 585.220555] CPU: 0 PID: 26206 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 585.227814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.237163] Call Trace: [ 585.239747] dump_stack+0x194/0x24d [ 585.243383] ? arch_local_irq_restore+0x53/0x53 [ 585.246604] IPVS: ftp: loaded support on port[0] = 21 [ 585.248050] ? rcutorture_record_progress+0x10/0x10 [ 585.258256] should_fail+0x8c0/0xa40 [ 585.261974] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 585.267080] ? __kernel_text_address+0xd/0x40 [ 585.271573] ? unwind_get_return_address+0x61/0xa0 [ 585.276526] ? find_held_lock+0x35/0x1d0 [ 585.280595] ? __lock_is_held+0xb6/0x140 [ 585.284121] IPVS: ftp: loaded support on port[0] = 21 [ 585.284663] ? check_same_owner+0x320/0x320 [ 585.294134] ? rcu_note_context_switch+0x710/0x710 [ 585.299075] should_failslab+0xec/0x120 [ 585.303047] kmem_cache_alloc_trace+0x4b/0x740 [ 585.307627] ? __kmalloc_node+0x33/0x70 [ 585.311596] ? __kmalloc_node+0x33/0x70 [ 585.315565] ? rcu_read_lock_sched_held+0x108/0x120 [ 585.320587] __memcg_init_list_lru_node+0x169/0x270 [ 585.325604] ? list_lru_add+0x7c0/0x7c0 [ 585.329430] IPVS: ftp: loaded support on port[0] = 21 [ 585.329568] ? __kmalloc_node+0x47/0x70 [ 585.329589] __list_lru_init+0x544/0x750 [ 585.342761] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 585.348648] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 585.353675] ? __lockdep_init_map+0xe4/0x650 [ 585.358087] ? lockdep_init_map+0x9/0x10 [ 585.362148] sget_userns+0x691/0xe40 [ 585.365853] ? set_anon_super+0x20/0x20 [ 585.369831] ? put_filp+0x90/0x90 [ 585.373280] ? destroy_unused_super.part.6+0xd0/0xd0 [ 585.378383] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 585.383403] ? trace_hardirqs_off+0x10/0x10 [ 585.387722] ? putname+0xee/0x130 [ 585.391176] ? cap_capable+0x1b5/0x230 [ 585.395075] ? security_capable+0x8e/0xc0 [ 585.399215] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 585.404386] ? ns_capable_common+0xcf/0x160 [ 585.408695] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 585.413863] mount_ns+0x6d/0x190 [ 585.417220] rpc_mount+0x9e/0xd0 [ 585.420575] mount_fs+0x66/0x2d0 [ 585.423932] vfs_kern_mount.part.26+0xc6/0x4a0 [ 585.428501] ? may_umount+0xa0/0xa0 [ 585.432109] ? _raw_read_unlock+0x22/0x30 [ 585.436235] ? __get_fs_type+0x8a/0xc0 [ 585.440117] do_mount+0xea4/0x2bb0 [ 585.443656] ? copy_mount_string+0x40/0x40 [ 585.447873] ? rcu_pm_notify+0xc0/0xc0 [ 585.451761] ? copy_mount_options+0x5f/0x2e0 [ 585.456147] ? rcu_read_lock_sched_held+0x108/0x120 [ 585.461145] ? kmem_cache_alloc_trace+0x459/0x740 [ 585.465973] ? kasan_check_write+0x14/0x20 [ 585.470187] ? _copy_from_user+0x99/0x110 [ 585.474326] ? copy_mount_options+0x1f7/0x2e0 [ 585.478825] SyS_mount+0xab/0x120 [ 585.482257] ? copy_mnt_ns+0xb30/0xb30 [ 585.486129] do_syscall_64+0x281/0x940 [ 585.489995] ? __do_page_fault+0xc90/0xc90 [ 585.494212] ? _raw_spin_unlock_irq+0x27/0x70 [ 585.498686] ? finish_task_switch+0x1c1/0x7e0 [ 585.503164] ? syscall_return_slowpath+0x550/0x550 [ 585.508074] ? syscall_return_slowpath+0x2ac/0x550 [ 585.512988] ? prepare_exit_to_usermode+0x350/0x350 [ 585.517988] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 585.523345] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 585.528182] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 585.533349] RIP: 0033:0x4548b9 [ 585.536517] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 585.544205] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 585.551452] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/03/29 10:49:35 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 585.558702] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 585.565948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 585.573194] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a [ 585.587327] IPVS: ftp: loaded support on port[0] = 21 [ 585.659719] IPVS: ftp: loaded support on port[0] = 21 [ 585.695218] IPVS: ftp: loaded support on port[0] = 21 [ 585.743270] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:35 executing program 4 (fault-call:12 fault-nth:11): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:35 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd2824982"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:35 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:35 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 585.903637] FAULT_INJECTION: forcing a failure. [ 585.903637] name failslab, interval 1, probability 0, space 0, times 0 [ 585.914944] CPU: 0 PID: 26228 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 585.922217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.931573] Call Trace: [ 585.934168] dump_stack+0x194/0x24d [ 585.937801] ? arch_local_irq_restore+0x53/0x53 [ 585.942466] ? __save_stack_trace+0x7e/0xd0 [ 585.946801] should_fail+0x8c0/0xa40 [ 585.950512] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 585.955607] ? kasan_kmalloc+0xad/0xe0 [ 585.959489] ? kmem_cache_alloc_trace+0x136/0x740 [ 585.964328] ? __memcg_init_list_lru_node+0x169/0x270 [ 585.969514] ? __list_lru_init+0x544/0x750 [ 585.973739] ? sget_userns+0x691/0xe40 [ 585.977626] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 585.982375] ? do_mount+0xea4/0x2bb0 [ 585.986078] ? SyS_mount+0xab/0x120 [ 585.989693] ? do_syscall_64+0x281/0x940 [ 585.993740] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 585.999101] ? find_held_lock+0x35/0x1d0 [ 586.003162] ? __lock_is_held+0xb6/0x140 [ 586.007232] ? check_same_owner+0x320/0x320 [ 586.011550] ? rcu_note_context_switch+0x710/0x710 [ 586.016486] should_failslab+0xec/0x120 [ 586.020457] kmem_cache_alloc_trace+0x4b/0x740 [ 586.025034] ? __kmalloc_node+0x33/0x70 [ 586.029004] ? __kmalloc_node+0x33/0x70 [ 586.032971] ? rcu_read_lock_sched_held+0x108/0x120 [ 586.037997] __memcg_init_list_lru_node+0x169/0x270 [ 586.043023] ? list_lru_add+0x7c0/0x7c0 [ 586.046998] ? __kmalloc_node+0x47/0x70 [ 586.050983] __list_lru_init+0x544/0x750 [ 586.055047] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 586.060910] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 586.065904] ? __lockdep_init_map+0xe4/0x650 [ 586.070290] ? lockdep_init_map+0x9/0x10 [ 586.074327] sget_userns+0x691/0xe40 [ 586.078017] ? set_anon_super+0x20/0x20 [ 586.081976] ? put_filp+0x90/0x90 [ 586.085406] ? destroy_unused_super.part.6+0xd0/0xd0 [ 586.090489] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 586.095484] ? trace_hardirqs_off+0x10/0x10 [ 586.099782] ? putname+0xee/0x130 [ 586.103213] ? cap_capable+0x1b5/0x230 [ 586.107080] ? security_capable+0x8e/0xc0 [ 586.111204] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 586.116366] ? ns_capable_common+0xcf/0x160 [ 586.120662] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 586.125824] mount_ns+0x6d/0x190 [ 586.129174] rpc_mount+0x9e/0xd0 [ 586.132518] mount_fs+0x66/0x2d0 [ 586.135863] vfs_kern_mount.part.26+0xc6/0x4a0 [ 586.140421] ? may_umount+0xa0/0xa0 [ 586.144028] ? _raw_read_unlock+0x22/0x30 [ 586.148153] ? __get_fs_type+0x8a/0xc0 [ 586.152033] do_mount+0xea4/0x2bb0 [ 586.155561] ? copy_mount_string+0x40/0x40 [ 586.159772] ? rcu_pm_notify+0xc0/0xc0 [ 586.163640] ? copy_mount_options+0x5f/0x2e0 [ 586.168031] ? rcu_read_lock_sched_held+0x108/0x120 [ 586.173028] ? kmem_cache_alloc_trace+0x459/0x740 [ 586.177850] ? kasan_check_write+0x14/0x20 [ 586.182074] ? _copy_from_user+0x99/0x110 [ 586.186202] ? copy_mount_options+0x1f7/0x2e0 [ 586.190677] SyS_mount+0xab/0x120 [ 586.194112] ? copy_mnt_ns+0xb30/0xb30 [ 586.197992] do_syscall_64+0x281/0x940 [ 586.201868] ? __do_page_fault+0xc90/0xc90 [ 586.206076] ? _raw_spin_unlock_irq+0x27/0x70 [ 586.210548] ? finish_task_switch+0x1c1/0x7e0 [ 586.215029] ? syscall_return_slowpath+0x550/0x550 [ 586.219936] ? syscall_return_slowpath+0x2ac/0x550 [ 586.224840] ? prepare_exit_to_usermode+0x350/0x350 [ 586.229832] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 586.235176] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 586.240001] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 586.245180] RIP: 0033:0x4548b9 2018/03/29 10:49:35 executing program 4 (fault-call:12 fault-nth:12): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 586.248343] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 586.256033] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 586.263281] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 586.270524] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 586.277768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 586.285029] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b [ 586.324511] FAULT_INJECTION: forcing a failure. [ 586.324511] name failslab, interval 1, probability 0, space 0, times 0 [ 586.335811] CPU: 1 PID: 26233 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 586.343070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.352401] Call Trace: [ 586.354985] dump_stack+0x194/0x24d [ 586.358595] ? arch_local_irq_restore+0x53/0x53 [ 586.363238] ? __save_stack_trace+0x7e/0xd0 [ 586.367542] should_fail+0x8c0/0xa40 [ 586.371233] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 586.376310] ? kasan_kmalloc+0xad/0xe0 [ 586.380172] ? kmem_cache_alloc_trace+0x136/0x740 [ 586.384992] ? __memcg_init_list_lru_node+0x169/0x270 [ 586.390159] ? __list_lru_init+0x544/0x750 [ 586.394366] ? sget_userns+0x691/0xe40 [ 586.398229] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 586.402966] ? do_mount+0xea4/0x2bb0 [ 586.406663] ? SyS_mount+0xab/0x120 [ 586.410261] ? do_syscall_64+0x281/0x940 [ 586.414297] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 586.419640] ? find_held_lock+0x35/0x1d0 [ 586.423682] ? __lock_is_held+0xb6/0x140 [ 586.427731] ? check_same_owner+0x320/0x320 [ 586.432039] ? rcu_note_context_switch+0x710/0x710 [ 586.436960] should_failslab+0xec/0x120 [ 586.440918] kmem_cache_alloc_trace+0x4b/0x740 [ 586.445478] ? __kmalloc_node+0x33/0x70 [ 586.449424] ? __kmalloc_node+0x33/0x70 [ 586.453375] ? rcu_read_lock_sched_held+0x108/0x120 [ 586.458372] __memcg_init_list_lru_node+0x169/0x270 [ 586.463369] ? list_lru_add+0x7c0/0x7c0 [ 586.467319] ? __kmalloc_node+0x47/0x70 [ 586.471278] __list_lru_init+0x544/0x750 [ 586.475319] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 586.481181] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 586.486175] ? __lockdep_init_map+0xe4/0x650 [ 586.490564] ? lockdep_init_map+0x9/0x10 [ 586.494603] sget_userns+0x691/0xe40 [ 586.498297] ? set_anon_super+0x20/0x20 [ 586.502258] ? put_filp+0x90/0x90 [ 586.505688] ? destroy_unused_super.part.6+0xd0/0xd0 [ 586.510769] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 586.515775] ? trace_hardirqs_off+0x10/0x10 [ 586.520073] ? putname+0xee/0x130 [ 586.523504] ? cap_capable+0x1b5/0x230 [ 586.527371] ? security_capable+0x8e/0xc0 [ 586.531499] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 586.536665] ? ns_capable_common+0xcf/0x160 [ 586.540964] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 586.546129] mount_ns+0x6d/0x190 [ 586.549474] rpc_mount+0x9e/0xd0 [ 586.552816] mount_fs+0x66/0x2d0 [ 586.556162] vfs_kern_mount.part.26+0xc6/0x4a0 [ 586.560722] ? may_umount+0xa0/0xa0 [ 586.564324] ? _raw_read_unlock+0x22/0x30 [ 586.568450] ? __get_fs_type+0x8a/0xc0 [ 586.572320] do_mount+0xea4/0x2bb0 [ 586.575842] ? copy_mount_string+0x40/0x40 [ 586.580057] ? rcu_pm_notify+0xc0/0xc0 [ 586.583930] ? copy_mount_options+0x5f/0x2e0 [ 586.588323] ? rcu_read_lock_sched_held+0x108/0x120 [ 586.593331] ? kmem_cache_alloc_trace+0x459/0x740 [ 586.598150] ? kasan_check_write+0x14/0x20 [ 586.602360] ? _copy_from_user+0x99/0x110 [ 586.606496] ? copy_mount_options+0x1f7/0x2e0 [ 586.610973] SyS_mount+0xab/0x120 [ 586.614401] ? copy_mnt_ns+0xb30/0xb30 [ 586.618264] do_syscall_64+0x281/0x940 [ 586.622126] ? __do_page_fault+0xc90/0xc90 [ 586.626333] ? _raw_spin_unlock_irq+0x27/0x70 [ 586.630805] ? finish_task_switch+0x1c1/0x7e0 [ 586.635274] ? syscall_return_slowpath+0x550/0x550 [ 586.640177] ? syscall_return_slowpath+0x2ac/0x550 [ 586.645082] ? prepare_exit_to_usermode+0x350/0x350 [ 586.650079] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 586.655424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 586.660254] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 586.665417] RIP: 0033:0x4548b9 [ 586.668581] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 10:49:36 executing program 4 (fault-call:12 fault-nth:13): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 586.676263] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 586.683508] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 586.690751] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 586.697996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 586.705247] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c [ 586.740422] FAULT_INJECTION: forcing a failure. [ 586.740422] name failslab, interval 1, probability 0, space 0, times 0 [ 586.751676] CPU: 1 PID: 26235 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 586.758942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.768279] Call Trace: [ 586.770850] dump_stack+0x194/0x24d [ 586.774458] ? arch_local_irq_restore+0x53/0x53 [ 586.779103] ? __save_stack_trace+0x7e/0xd0 [ 586.783768] should_fail+0x8c0/0xa40 [ 586.787466] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 586.792547] ? kasan_kmalloc+0xad/0xe0 [ 586.796409] ? kmem_cache_alloc_trace+0x136/0x740 [ 586.801227] ? __memcg_init_list_lru_node+0x169/0x270 [ 586.806392] ? __list_lru_init+0x544/0x750 [ 586.810637] ? sget_userns+0x691/0xe40 [ 586.814504] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 586.819235] ? do_mount+0xea4/0x2bb0 [ 586.822921] ? SyS_mount+0xab/0x120 [ 586.826523] ? do_syscall_64+0x281/0x940 [ 586.830561] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 586.835906] ? find_held_lock+0x35/0x1d0 [ 586.839951] ? __lock_is_held+0xb6/0x140 [ 586.844005] ? check_same_owner+0x320/0x320 [ 586.848313] ? rcu_note_context_switch+0x710/0x710 [ 586.853227] should_failslab+0xec/0x120 [ 586.857180] kmem_cache_alloc_trace+0x4b/0x740 [ 586.861738] ? __kmalloc_node+0x33/0x70 [ 586.865700] __memcg_init_list_lru_node+0x169/0x270 [ 586.870696] ? list_lru_add+0x7c0/0x7c0 [ 586.874645] ? __kmalloc_node+0x47/0x70 [ 586.878605] __list_lru_init+0x544/0x750 [ 586.882652] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 586.888517] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 586.893513] ? __lockdep_init_map+0xe4/0x650 [ 586.897900] ? lockdep_init_map+0x9/0x10 [ 586.901942] sget_userns+0x691/0xe40 [ 586.905630] ? set_anon_super+0x20/0x20 [ 586.909583] ? put_filp+0x90/0x90 [ 586.913018] ? destroy_unused_super.part.6+0xd0/0xd0 [ 586.918101] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 586.923098] ? trace_hardirqs_off+0x10/0x10 [ 586.927398] ? putname+0xee/0x130 [ 586.930832] ? cap_capable+0x1b5/0x230 [ 586.934703] ? security_capable+0x8e/0xc0 [ 586.938831] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 586.943995] ? ns_capable_common+0xcf/0x160 [ 586.948310] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 586.953477] mount_ns+0x6d/0x190 [ 586.956828] rpc_mount+0x9e/0xd0 [ 586.960175] mount_fs+0x66/0x2d0 [ 586.963526] vfs_kern_mount.part.26+0xc6/0x4a0 [ 586.968087] ? may_umount+0xa0/0xa0 [ 586.971692] ? _raw_read_unlock+0x22/0x30 [ 586.975814] ? __get_fs_type+0x8a/0xc0 [ 586.979683] do_mount+0xea4/0x2bb0 [ 586.983210] ? copy_mount_string+0x40/0x40 [ 586.987424] ? rcu_pm_notify+0xc0/0xc0 [ 586.992019] ? copy_mount_options+0x5f/0x2e0 [ 586.996409] ? rcu_read_lock_sched_held+0x108/0x120 [ 587.001407] ? kmem_cache_alloc_trace+0x459/0x740 [ 587.006230] ? kasan_check_write+0x14/0x20 [ 587.010443] ? _copy_from_user+0x99/0x110 [ 587.014575] ? copy_mount_options+0x1f7/0x2e0 [ 587.019050] SyS_mount+0xab/0x120 [ 587.022478] ? copy_mnt_ns+0xb30/0xb30 [ 587.026344] do_syscall_64+0x281/0x940 [ 587.030205] ? __do_page_fault+0xc90/0xc90 [ 587.034416] ? _raw_spin_unlock_irq+0x27/0x70 [ 587.038890] ? finish_task_switch+0x1c1/0x7e0 [ 587.043363] ? syscall_return_slowpath+0x550/0x550 [ 587.048268] ? syscall_return_slowpath+0x2ac/0x550 [ 587.053174] ? prepare_exit_to_usermode+0x350/0x350 [ 587.058168] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 587.063512] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 587.068340] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 587.073503] RIP: 0033:0x4548b9 [ 587.076668] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 587.084351] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 2018/03/29 10:49:36 executing program 4 (fault-call:12 fault-nth:14): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 587.091597] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 587.098840] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 587.106083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 587.113326] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d [ 587.179686] FAULT_INJECTION: forcing a failure. [ 587.179686] name failslab, interval 1, probability 0, space 0, times 0 [ 587.190998] CPU: 0 PID: 26243 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 587.198276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.207627] Call Trace: [ 587.210201] dump_stack+0x194/0x24d [ 587.213810] ? arch_local_irq_restore+0x53/0x53 [ 587.218454] ? __save_stack_trace+0x7e/0xd0 [ 587.222763] should_fail+0x8c0/0xa40 [ 587.226460] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 587.231543] ? kasan_kmalloc+0xad/0xe0 [ 587.235403] ? kmem_cache_alloc_trace+0x136/0x740 [ 587.240224] ? __memcg_init_list_lru_node+0x169/0x270 [ 587.245388] ? __list_lru_init+0x544/0x750 [ 587.249596] ? sget_userns+0x691/0xe40 [ 587.253462] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 587.258189] ? do_mount+0xea4/0x2bb0 [ 587.261876] ? SyS_mount+0xab/0x120 [ 587.265480] ? do_syscall_64+0x281/0x940 [ 587.269517] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 587.274868] ? find_held_lock+0x35/0x1d0 [ 587.278913] ? __lock_is_held+0xb6/0x140 [ 587.282959] ? check_same_owner+0x320/0x320 [ 587.287260] ? rcu_note_context_switch+0x710/0x710 [ 587.292187] should_failslab+0xec/0x120 [ 587.296143] kmem_cache_alloc_trace+0x4b/0x740 [ 587.300701] ? __kmalloc_node+0x33/0x70 [ 587.304650] ? __kmalloc_node+0x33/0x70 [ 587.308600] ? rcu_read_lock_sched_held+0x108/0x120 [ 587.313606] __memcg_init_list_lru_node+0x169/0x270 [ 587.318602] ? list_lru_add+0x7c0/0x7c0 [ 587.322552] ? __kmalloc_node+0x47/0x70 [ 587.326506] __list_lru_init+0x544/0x750 [ 587.330551] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 587.336411] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 587.341406] ? __lockdep_init_map+0xe4/0x650 [ 587.345793] ? lockdep_init_map+0x9/0x10 [ 587.349834] sget_userns+0x691/0xe40 [ 587.353522] ? set_anon_super+0x20/0x20 [ 587.357477] ? put_filp+0x90/0x90 [ 587.360908] ? destroy_unused_super.part.6+0xd0/0xd0 [ 587.365989] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 587.370987] ? trace_hardirqs_off+0x10/0x10 [ 587.375297] ? putname+0xee/0x130 [ 587.378738] ? cap_capable+0x1b5/0x230 [ 587.382609] ? security_capable+0x8e/0xc0 [ 587.386734] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 587.391899] ? ns_capable_common+0xcf/0x160 [ 587.396198] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 587.401361] mount_ns+0x6d/0x190 [ 587.404707] rpc_mount+0x9e/0xd0 [ 587.408054] mount_fs+0x66/0x2d0 [ 587.411400] vfs_kern_mount.part.26+0xc6/0x4a0 [ 587.415960] ? may_umount+0xa0/0xa0 [ 587.419562] ? _raw_read_unlock+0x22/0x30 [ 587.423695] ? __get_fs_type+0x8a/0xc0 [ 587.427564] do_mount+0xea4/0x2bb0 [ 587.431086] ? copy_mount_string+0x40/0x40 [ 587.435302] ? rcu_pm_notify+0xc0/0xc0 [ 587.439187] ? copy_mount_options+0x5f/0x2e0 [ 587.443570] ? rcu_read_lock_sched_held+0x108/0x120 [ 587.448560] ? kmem_cache_alloc_trace+0x459/0x740 [ 587.453381] ? kasan_check_write+0x14/0x20 [ 587.457592] ? _copy_from_user+0x99/0x110 [ 587.461719] ? copy_mount_options+0x1f7/0x2e0 [ 587.466194] SyS_mount+0xab/0x120 [ 587.469621] ? copy_mnt_ns+0xb30/0xb30 [ 587.473487] do_syscall_64+0x281/0x940 [ 587.477348] ? __do_page_fault+0xc90/0xc90 [ 587.481554] ? _raw_spin_unlock_irq+0x27/0x70 [ 587.486035] ? finish_task_switch+0x1c1/0x7e0 [ 587.490541] ? syscall_return_slowpath+0x550/0x550 [ 587.495455] ? syscall_return_slowpath+0x2ac/0x550 [ 587.500360] ? prepare_exit_to_usermode+0x350/0x350 [ 587.505352] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 587.510695] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 587.515538] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 587.520700] RIP: 0033:0x4548b9 2018/03/29 10:49:37 executing program 4 (fault-call:12 fault-nth:15): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 587.523869] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 587.531549] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 587.538794] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 587.546044] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 587.553292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 587.560539] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e [ 587.595935] FAULT_INJECTION: forcing a failure. [ 587.595935] name failslab, interval 1, probability 0, space 0, times 0 [ 587.607233] CPU: 0 PID: 26250 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 587.614495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.623833] Call Trace: [ 587.626418] dump_stack+0x194/0x24d [ 587.630039] ? arch_local_irq_restore+0x53/0x53 [ 587.634695] ? __save_stack_trace+0x7e/0xd0 [ 587.639021] should_fail+0x8c0/0xa40 [ 587.642733] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 587.647826] ? kasan_kmalloc+0xad/0xe0 [ 587.651700] ? kmem_cache_alloc_trace+0x136/0x740 [ 587.656536] ? __memcg_init_list_lru_node+0x169/0x270 [ 587.661712] ? __list_lru_init+0x544/0x750 [ 587.665928] ? sget_userns+0x691/0xe40 [ 587.669808] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 587.674549] ? do_mount+0xea4/0x2bb0 [ 587.678246] ? SyS_mount+0xab/0x120 [ 587.681870] ? do_syscall_64+0x281/0x940 [ 587.685916] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 587.691279] ? find_held_lock+0x35/0x1d0 [ 587.695338] ? __lock_is_held+0xb6/0x140 [ 587.699411] ? check_same_owner+0x320/0x320 [ 587.703726] ? rcu_note_context_switch+0x710/0x710 [ 587.708659] should_failslab+0xec/0x120 [ 587.712625] kmem_cache_alloc_trace+0x4b/0x740 [ 587.717195] ? __kmalloc_node+0x33/0x70 [ 587.721156] ? __kmalloc_node+0x33/0x70 [ 587.725122] ? rcu_read_lock_sched_held+0x108/0x120 [ 587.730162] __memcg_init_list_lru_node+0x169/0x270 [ 587.735175] ? list_lru_add+0x7c0/0x7c0 [ 587.739138] ? __kmalloc_node+0x47/0x70 [ 587.743111] __list_lru_init+0x544/0x750 [ 587.747170] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 587.753048] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 587.758059] ? __lockdep_init_map+0xe4/0x650 [ 587.762462] ? lockdep_init_map+0x9/0x10 [ 587.766517] sget_userns+0x691/0xe40 [ 587.770217] ? set_anon_super+0x20/0x20 [ 587.774190] ? put_filp+0x90/0x90 [ 587.777636] ? destroy_unused_super.part.6+0xd0/0xd0 [ 587.782733] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 587.787745] ? trace_hardirqs_off+0x10/0x10 [ 587.792062] ? putname+0xee/0x130 [ 587.795513] ? cap_capable+0x1b5/0x230 [ 587.799400] ? security_capable+0x8e/0xc0 [ 587.803542] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 587.808724] ? ns_capable_common+0xcf/0x160 [ 587.813041] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 587.818218] mount_ns+0x6d/0x190 [ 587.821582] rpc_mount+0x9e/0xd0 [ 587.824945] mount_fs+0x66/0x2d0 [ 587.828308] vfs_kern_mount.part.26+0xc6/0x4a0 [ 587.832882] ? may_umount+0xa0/0xa0 [ 587.836496] ? _raw_read_unlock+0x22/0x30 [ 587.840632] ? __get_fs_type+0x8a/0xc0 [ 587.844520] do_mount+0xea4/0x2bb0 [ 587.848063] ? copy_mount_string+0x40/0x40 [ 587.852285] ? rcu_pm_notify+0xc0/0xc0 [ 587.856180] ? copy_mount_options+0x5f/0x2e0 [ 587.860576] ? rcu_read_lock_sched_held+0x108/0x120 [ 587.865586] ? kmem_cache_alloc_trace+0x459/0x740 [ 587.870421] ? kasan_check_write+0x14/0x20 [ 587.874644] ? _copy_from_user+0x99/0x110 [ 587.878790] ? copy_mount_options+0x1f7/0x2e0 [ 587.883283] SyS_mount+0xab/0x120 [ 587.886726] ? copy_mnt_ns+0xb30/0xb30 [ 587.890605] do_syscall_64+0x281/0x940 [ 587.894478] ? __do_page_fault+0xc90/0xc90 [ 587.898699] ? _raw_spin_unlock_irq+0x27/0x70 [ 587.903185] ? finish_task_switch+0x1c1/0x7e0 [ 587.907673] ? syscall_return_slowpath+0x550/0x550 [ 587.912593] ? syscall_return_slowpath+0x2ac/0x550 [ 587.917513] ? prepare_exit_to_usermode+0x350/0x350 [ 587.922520] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 587.927881] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 587.932723] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 587.937897] RIP: 0033:0x4548b9 2018/03/29 10:49:37 executing program 4 (fault-call:12 fault-nth:16): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 587.941073] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 587.948768] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 587.956023] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 587.963281] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 587.970538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 587.977794] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f [ 588.031010] FAULT_INJECTION: forcing a failure. [ 588.031010] name failslab, interval 1, probability 0, space 0, times 0 [ 588.042319] CPU: 0 PID: 26252 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 588.049578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.058917] Call Trace: [ 588.061499] dump_stack+0x194/0x24d [ 588.065122] ? arch_local_irq_restore+0x53/0x53 [ 588.069775] ? __save_stack_trace+0x7e/0xd0 [ 588.074102] should_fail+0x8c0/0xa40 [ 588.077813] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 588.082901] ? kasan_kmalloc+0xad/0xe0 [ 588.086770] ? kmem_cache_alloc_trace+0x136/0x740 [ 588.091597] ? __memcg_init_list_lru_node+0x169/0x270 [ 588.096771] ? __list_lru_init+0x544/0x750 [ 588.100988] ? sget_userns+0x691/0xe40 [ 588.104865] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 588.109607] ? do_mount+0xea4/0x2bb0 [ 588.113303] ? SyS_mount+0xab/0x120 [ 588.116916] ? do_syscall_64+0x281/0x940 [ 588.120961] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 588.126320] ? find_held_lock+0x35/0x1d0 [ 588.130378] ? __lock_is_held+0xb6/0x140 [ 588.134452] ? check_same_owner+0x320/0x320 [ 588.138767] ? rcu_note_context_switch+0x710/0x710 [ 588.143698] should_failslab+0xec/0x120 [ 588.147661] kmem_cache_alloc_trace+0x4b/0x740 [ 588.152231] ? __kmalloc_node+0x33/0x70 [ 588.156188] ? __kmalloc_node+0x33/0x70 [ 588.160151] ? rcu_read_lock_sched_held+0x108/0x120 [ 588.165168] __memcg_init_list_lru_node+0x169/0x270 [ 588.170179] ? list_lru_add+0x7c0/0x7c0 [ 588.174142] ? __kmalloc_node+0x47/0x70 [ 588.178119] __list_lru_init+0x544/0x750 [ 588.182180] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 588.188058] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 588.193065] ? __lockdep_init_map+0xe4/0x650 [ 588.197467] ? lockdep_init_map+0x9/0x10 [ 588.201521] sget_userns+0x691/0xe40 [ 588.205218] ? set_anon_super+0x20/0x20 [ 588.209188] ? put_filp+0x90/0x90 [ 588.212630] ? destroy_unused_super.part.6+0xd0/0xd0 [ 588.217726] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 588.222750] ? trace_hardirqs_off+0x10/0x10 [ 588.227064] ? putname+0xee/0x130 [ 588.230510] ? cap_capable+0x1b5/0x230 [ 588.234396] ? security_capable+0x8e/0xc0 [ 588.238538] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 588.243714] ? ns_capable_common+0xcf/0x160 [ 588.248031] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 588.253207] mount_ns+0x6d/0x190 [ 588.256571] rpc_mount+0x9e/0xd0 [ 588.259933] mount_fs+0x66/0x2d0 [ 588.263298] vfs_kern_mount.part.26+0xc6/0x4a0 [ 588.267870] ? may_umount+0xa0/0xa0 [ 588.271570] ? _raw_read_unlock+0x22/0x30 [ 588.275708] ? __get_fs_type+0x8a/0xc0 [ 588.279596] do_mount+0xea4/0x2bb0 [ 588.283137] ? copy_mount_string+0x40/0x40 [ 588.287360] ? rcu_pm_notify+0xc0/0xc0 [ 588.291252] ? copy_mount_options+0x5f/0x2e0 [ 588.295646] ? rcu_read_lock_sched_held+0x108/0x120 [ 588.300651] ? kmem_cache_alloc_trace+0x459/0x740 [ 588.305572] ? kasan_check_write+0x14/0x20 [ 588.309808] ? _copy_from_user+0x99/0x110 [ 588.313953] ? copy_mount_options+0x1f7/0x2e0 [ 588.318444] SyS_mount+0xab/0x120 [ 588.321883] ? copy_mnt_ns+0xb30/0xb30 [ 588.325760] do_syscall_64+0x281/0x940 [ 588.329640] ? __do_page_fault+0xc90/0xc90 [ 588.333858] ? _raw_spin_unlock_irq+0x27/0x70 [ 588.338342] ? finish_task_switch+0x1c1/0x7e0 [ 588.342824] ? syscall_return_slowpath+0x550/0x550 [ 588.347743] ? syscall_return_slowpath+0x2ac/0x550 [ 588.352699] ? prepare_exit_to_usermode+0x350/0x350 [ 588.357710] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 588.363097] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 588.367939] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 588.373114] RIP: 0033:0x4548b9 [ 588.376287] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 588.383982] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 588.391237] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 588.398492] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 588.405749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 588.413010] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 [ 588.676338] IPVS: ftp: loaded support on port[0] = 21 [ 588.702510] IPVS: ftp: loaded support on port[0] = 21 [ 588.737283] IPVS: ftp: loaded support on port[0] = 21 [ 588.775186] IPVS: ftp: loaded support on port[0] = 21 [ 588.816278] IPVS: ftp: loaded support on port[0] = 21 [ 588.860606] IPVS: ftp: loaded support on port[0] = 21 [ 588.907905] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:38 executing program 4 (fault-call:12 fault-nth:17): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:38 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:38 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:38 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd2824982"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 589.023583] FAULT_INJECTION: forcing a failure. [ 589.023583] name failslab, interval 1, probability 0, space 0, times 0 [ 589.034876] CPU: 0 PID: 26269 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 589.042150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.051504] Call Trace: [ 589.054101] dump_stack+0x194/0x24d [ 589.057746] ? arch_local_irq_restore+0x53/0x53 [ 589.062410] ? __save_stack_trace+0x7e/0xd0 [ 589.066744] should_fail+0x8c0/0xa40 [ 589.070456] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 589.075553] ? kasan_kmalloc+0xad/0xe0 [ 589.079427] ? kmem_cache_alloc_trace+0x136/0x740 [ 589.084263] ? __memcg_init_list_lru_node+0x169/0x270 [ 589.089443] ? __list_lru_init+0x544/0x750 [ 589.093669] ? sget_userns+0x691/0xe40 [ 589.097553] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 589.102318] ? do_mount+0xea4/0x2bb0 [ 589.106026] ? SyS_mount+0xab/0x120 [ 589.109652] ? do_syscall_64+0x281/0x940 [ 589.113719] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 589.119090] ? find_held_lock+0x35/0x1d0 [ 589.123157] ? __lock_is_held+0xb6/0x140 [ 589.127233] ? check_same_owner+0x320/0x320 [ 589.131556] ? rcu_note_context_switch+0x710/0x710 [ 589.136490] should_failslab+0xec/0x120 [ 589.140458] kmem_cache_alloc_trace+0x4b/0x740 [ 589.145033] ? __kmalloc_node+0x33/0x70 [ 589.148994] ? __kmalloc_node+0x33/0x70 [ 589.152962] ? rcu_read_lock_sched_held+0x108/0x120 [ 589.158552] __memcg_init_list_lru_node+0x169/0x270 [ 589.163568] ? list_lru_add+0x7c0/0x7c0 [ 589.167540] ? __kmalloc_node+0x47/0x70 [ 589.171525] __list_lru_init+0x544/0x750 [ 589.175591] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 589.181473] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 589.186487] ? __lockdep_init_map+0xe4/0x650 [ 589.190896] ? lockdep_init_map+0x9/0x10 [ 589.194953] sget_userns+0x691/0xe40 [ 589.198658] ? set_anon_super+0x20/0x20 [ 589.202634] ? put_filp+0x90/0x90 [ 589.206083] ? destroy_unused_super.part.6+0xd0/0xd0 [ 589.211185] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 589.216194] ? trace_hardirqs_off+0x10/0x10 [ 589.220495] ? putname+0xee/0x130 [ 589.223928] ? cap_capable+0x1b5/0x230 [ 589.227796] ? security_capable+0x8e/0xc0 [ 589.231922] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 589.237086] ? ns_capable_common+0xcf/0x160 [ 589.241387] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 589.246549] mount_ns+0x6d/0x190 [ 589.249894] rpc_mount+0x9e/0xd0 [ 589.253239] mount_fs+0x66/0x2d0 [ 589.256584] vfs_kern_mount.part.26+0xc6/0x4a0 [ 589.261154] ? may_umount+0xa0/0xa0 [ 589.264762] ? _raw_read_unlock+0x22/0x30 [ 589.268884] ? __get_fs_type+0x8a/0xc0 [ 589.272753] do_mount+0xea4/0x2bb0 [ 589.276274] ? copy_mount_string+0x40/0x40 [ 589.280492] ? rcu_pm_notify+0xc0/0xc0 [ 589.284364] ? copy_mount_options+0x5f/0x2e0 [ 589.288746] ? rcu_read_lock_sched_held+0x108/0x120 [ 589.293736] ? kmem_cache_alloc_trace+0x459/0x740 [ 589.298556] ? kasan_check_write+0x14/0x20 [ 589.302766] ? _copy_from_user+0x99/0x110 [ 589.306892] ? copy_mount_options+0x1f7/0x2e0 [ 589.311366] SyS_mount+0xab/0x120 [ 589.314794] ? copy_mnt_ns+0xb30/0xb30 [ 589.318667] do_syscall_64+0x281/0x940 [ 589.322531] ? __do_page_fault+0xc90/0xc90 [ 589.326742] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 589.332254] ? syscall_return_slowpath+0x550/0x550 [ 589.337159] ? syscall_return_slowpath+0x2ac/0x550 [ 589.342068] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 589.347411] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 589.352248] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 589.357411] RIP: 0033:0x4548b9 [ 589.360572] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 10:49:39 executing program 4 (fault-call:12 fault-nth:18): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 589.368254] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 589.375499] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 589.382741] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 589.389985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 589.397232] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 [ 589.433418] FAULT_INJECTION: forcing a failure. [ 589.433418] name failslab, interval 1, probability 0, space 0, times 0 [ 589.444686] CPU: 0 PID: 26273 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 589.451942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.461272] Call Trace: [ 589.463839] dump_stack+0x194/0x24d [ 589.467453] ? arch_local_irq_restore+0x53/0x53 [ 589.472106] ? __save_stack_trace+0x7e/0xd0 [ 589.476412] should_fail+0x8c0/0xa40 [ 589.480105] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 589.485185] ? kasan_kmalloc+0xad/0xe0 [ 589.489050] ? kmem_cache_alloc_trace+0x136/0x740 [ 589.493867] ? __memcg_init_list_lru_node+0x169/0x270 [ 589.499037] ? __list_lru_init+0x544/0x750 [ 589.503251] ? sget_userns+0x691/0xe40 [ 589.507116] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 589.511845] ? do_mount+0xea4/0x2bb0 [ 589.515531] ? SyS_mount+0xab/0x120 [ 589.519133] ? do_syscall_64+0x281/0x940 [ 589.523178] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 589.528520] ? find_held_lock+0x35/0x1d0 [ 589.532570] ? __lock_is_held+0xb6/0x140 [ 589.536618] ? check_same_owner+0x320/0x320 [ 589.540918] ? rcu_note_context_switch+0x710/0x710 [ 589.545831] should_failslab+0xec/0x120 [ 589.549782] kmem_cache_alloc_trace+0x4b/0x740 [ 589.554340] ? __kmalloc_node+0x33/0x70 [ 589.558288] ? __kmalloc_node+0x33/0x70 [ 589.562238] ? rcu_read_lock_sched_held+0x108/0x120 [ 589.567233] __memcg_init_list_lru_node+0x169/0x270 [ 589.572226] ? list_lru_add+0x7c0/0x7c0 [ 589.576187] ? __kmalloc_node+0x47/0x70 [ 589.580157] __list_lru_init+0x544/0x750 [ 589.584200] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 589.590061] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 589.595054] ? __lockdep_init_map+0xe4/0x650 [ 589.599440] ? lockdep_init_map+0x9/0x10 [ 589.603479] sget_userns+0x691/0xe40 [ 589.607165] ? set_anon_super+0x20/0x20 [ 589.611118] ? put_filp+0x90/0x90 [ 589.614547] ? destroy_unused_super.part.6+0xd0/0xd0 [ 589.619626] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 589.624630] ? trace_hardirqs_off+0x10/0x10 [ 589.628934] ? putname+0xee/0x130 [ 589.632367] ? cap_capable+0x1b5/0x230 [ 589.636233] ? security_capable+0x8e/0xc0 [ 589.640359] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 589.645520] ? ns_capable_common+0xcf/0x160 [ 589.649818] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 589.654989] mount_ns+0x6d/0x190 [ 589.658341] rpc_mount+0x9e/0xd0 [ 589.661684] mount_fs+0x66/0x2d0 [ 589.665039] vfs_kern_mount.part.26+0xc6/0x4a0 [ 589.669600] ? may_umount+0xa0/0xa0 [ 589.673203] ? _raw_read_unlock+0x22/0x30 [ 589.677326] ? __get_fs_type+0x8a/0xc0 [ 589.681280] do_mount+0xea4/0x2bb0 [ 589.684802] ? copy_mount_string+0x40/0x40 [ 589.689018] ? rcu_pm_notify+0xc0/0xc0 [ 589.692896] ? copy_mount_options+0x5f/0x2e0 [ 589.697282] ? rcu_read_lock_sched_held+0x108/0x120 [ 589.702279] ? kmem_cache_alloc_trace+0x459/0x740 [ 589.707097] ? kasan_check_write+0x14/0x20 [ 589.711318] ? _copy_from_user+0x99/0x110 [ 589.715443] ? copy_mount_options+0x1f7/0x2e0 [ 589.719918] SyS_mount+0xab/0x120 [ 589.723348] ? copy_mnt_ns+0xb30/0xb30 [ 589.727213] do_syscall_64+0x281/0x940 [ 589.731074] ? __do_page_fault+0xc90/0xc90 [ 589.735296] ? _raw_spin_unlock_irq+0x27/0x70 [ 589.739782] ? finish_task_switch+0x1c1/0x7e0 [ 589.744252] ? syscall_return_slowpath+0x550/0x550 [ 589.749158] ? syscall_return_slowpath+0x2ac/0x550 [ 589.754065] ? prepare_exit_to_usermode+0x350/0x350 [ 589.759055] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 589.764397] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 589.769217] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 589.774378] RIP: 0033:0x4548b9 [ 589.777545] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 10:49:39 executing program 4 (fault-call:12 fault-nth:19): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 589.785233] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 589.792476] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 589.799722] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 589.806966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 589.814211] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 [ 589.862612] FAULT_INJECTION: forcing a failure. [ 589.862612] name failslab, interval 1, probability 0, space 0, times 0 [ 589.873892] CPU: 1 PID: 26276 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 589.881157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.890487] Call Trace: [ 589.893065] dump_stack+0x194/0x24d [ 589.896686] ? arch_local_irq_restore+0x53/0x53 [ 589.901335] ? __save_stack_trace+0x7e/0xd0 [ 589.905654] should_fail+0x8c0/0xa40 [ 589.909349] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 589.914428] ? kasan_kmalloc+0xad/0xe0 [ 589.918288] ? kmem_cache_alloc_trace+0x136/0x740 [ 589.923106] ? __memcg_init_list_lru_node+0x169/0x270 [ 589.928269] ? __list_lru_init+0x544/0x750 [ 589.932483] ? sget_userns+0x691/0xe40 [ 589.936349] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 589.941094] ? do_mount+0xea4/0x2bb0 [ 589.944789] ? SyS_mount+0xab/0x120 [ 589.948401] ? do_syscall_64+0x281/0x940 [ 589.952450] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 589.957798] ? find_held_lock+0x35/0x1d0 [ 589.961839] ? __lock_is_held+0xb6/0x140 [ 589.965896] ? check_same_owner+0x320/0x320 [ 589.970197] ? rcu_note_context_switch+0x710/0x710 [ 589.975111] should_failslab+0xec/0x120 [ 589.979059] kmem_cache_alloc_trace+0x4b/0x740 [ 589.983616] ? __kmalloc_node+0x33/0x70 [ 589.987563] ? __kmalloc_node+0x33/0x70 [ 589.991512] ? rcu_read_lock_sched_held+0x108/0x120 [ 589.996511] __memcg_init_list_lru_node+0x169/0x270 [ 590.001517] ? list_lru_add+0x7c0/0x7c0 [ 590.005468] ? __kmalloc_node+0x47/0x70 [ 590.009424] __list_lru_init+0x544/0x750 [ 590.013471] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 590.019334] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 590.024331] ? __lockdep_init_map+0xe4/0x650 [ 590.028721] ? lockdep_init_map+0x9/0x10 [ 590.032761] sget_userns+0x691/0xe40 [ 590.036452] ? set_anon_super+0x20/0x20 [ 590.040408] ? put_filp+0x90/0x90 [ 590.043839] ? destroy_unused_super.part.6+0xd0/0xd0 [ 590.048922] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 590.053919] ? trace_hardirqs_off+0x10/0x10 [ 590.058218] ? putname+0xee/0x130 [ 590.061659] ? cap_capable+0x1b5/0x230 [ 590.065528] ? security_capable+0x8e/0xc0 [ 590.069656] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 590.074819] ? ns_capable_common+0xcf/0x160 [ 590.079117] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 590.084284] mount_ns+0x6d/0x190 [ 590.087637] rpc_mount+0x9e/0xd0 [ 590.090979] mount_fs+0x66/0x2d0 [ 590.094325] vfs_kern_mount.part.26+0xc6/0x4a0 [ 590.098886] ? may_umount+0xa0/0xa0 [ 590.102488] ? _raw_read_unlock+0x22/0x30 [ 590.106609] ? __get_fs_type+0x8a/0xc0 [ 590.110476] do_mount+0xea4/0x2bb0 [ 590.113998] ? copy_mount_string+0x40/0x40 [ 590.118215] ? rcu_pm_notify+0xc0/0xc0 [ 590.122086] ? copy_mount_options+0x5f/0x2e0 [ 590.126470] ? rcu_read_lock_sched_held+0x108/0x120 [ 590.131461] ? kmem_cache_alloc_trace+0x459/0x740 [ 590.136279] ? kasan_check_write+0x14/0x20 [ 590.140493] ? _copy_from_user+0x99/0x110 [ 590.144620] ? copy_mount_options+0x1f7/0x2e0 [ 590.149095] SyS_mount+0xab/0x120 [ 590.152525] ? copy_mnt_ns+0xb30/0xb30 [ 590.156391] do_syscall_64+0x281/0x940 [ 590.160254] ? __do_page_fault+0xc90/0xc90 [ 590.164459] ? _raw_spin_unlock_irq+0x27/0x70 [ 590.168929] ? finish_task_switch+0x1c1/0x7e0 [ 590.173401] ? syscall_return_slowpath+0x550/0x550 [ 590.178303] ? syscall_return_slowpath+0x2ac/0x550 [ 590.183211] ? prepare_exit_to_usermode+0x350/0x350 [ 590.188203] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 590.193549] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 590.198373] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 590.203535] RIP: 0033:0x4548b9 [ 590.206699] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 10:49:39 executing program 4 (fault-call:12 fault-nth:20): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 590.214383] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 590.221628] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 590.228886] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 590.236135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 590.243386] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 [ 590.346267] FAULT_INJECTION: forcing a failure. [ 590.346267] name failslab, interval 1, probability 0, space 0, times 0 [ 590.357575] CPU: 1 PID: 26285 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 590.364843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.374181] Call Trace: [ 590.376764] dump_stack+0x194/0x24d [ 590.380375] ? arch_local_irq_restore+0x53/0x53 [ 590.385033] ? __save_stack_trace+0x7e/0xd0 [ 590.389350] should_fail+0x8c0/0xa40 [ 590.393063] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 590.398145] ? kasan_kmalloc+0xad/0xe0 [ 590.402008] ? kmem_cache_alloc_trace+0x136/0x740 [ 590.406833] ? __memcg_init_list_lru_node+0x169/0x270 [ 590.411997] ? __list_lru_init+0x544/0x750 [ 590.416211] ? sget_userns+0x691/0xe40 [ 590.420076] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 590.424810] ? do_mount+0xea4/0x2bb0 [ 590.428498] ? SyS_mount+0xab/0x120 [ 590.432106] ? do_syscall_64+0x281/0x940 [ 590.436141] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 590.441485] ? find_held_lock+0x35/0x1d0 [ 590.445526] ? __lock_is_held+0xb6/0x140 [ 590.449575] ? check_same_owner+0x320/0x320 [ 590.453876] ? rcu_note_context_switch+0x710/0x710 [ 590.458801] should_failslab+0xec/0x120 [ 590.462771] kmem_cache_alloc_trace+0x4b/0x740 [ 590.467333] ? __kmalloc_node+0x33/0x70 [ 590.471280] ? __kmalloc_node+0x33/0x70 [ 590.475230] ? rcu_read_lock_sched_held+0x108/0x120 [ 590.480229] __memcg_init_list_lru_node+0x169/0x270 [ 590.485226] ? list_lru_add+0x7c0/0x7c0 [ 590.489177] ? __kmalloc_node+0x47/0x70 [ 590.493134] __list_lru_init+0x544/0x750 [ 590.497176] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 590.503048] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 590.508047] ? __lockdep_init_map+0xe4/0x650 [ 590.512433] ? lockdep_init_map+0x9/0x10 [ 590.516472] sget_userns+0x691/0xe40 [ 590.520161] ? set_anon_super+0x20/0x20 [ 590.524114] ? put_filp+0x90/0x90 [ 590.527540] ? destroy_unused_super.part.6+0xd0/0xd0 [ 590.532621] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 590.537626] ? trace_hardirqs_off+0x10/0x10 [ 590.541925] ? putname+0xee/0x130 [ 590.545358] ? cap_capable+0x1b5/0x230 [ 590.549228] ? security_capable+0x8e/0xc0 [ 590.553353] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 590.558533] ? ns_capable_common+0xcf/0x160 [ 590.562838] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 590.568015] mount_ns+0x6d/0x190 [ 590.571370] rpc_mount+0x9e/0xd0 [ 590.574714] mount_fs+0x66/0x2d0 [ 590.578058] vfs_kern_mount.part.26+0xc6/0x4a0 [ 590.582618] ? may_umount+0xa0/0xa0 [ 590.586223] ? _raw_read_unlock+0x22/0x30 [ 590.590347] ? __get_fs_type+0x8a/0xc0 [ 590.594215] do_mount+0xea4/0x2bb0 [ 590.597737] ? copy_mount_string+0x40/0x40 [ 590.601946] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 590.606946] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 590.611685] ? retint_kernel+0x10/0x10 [ 590.615559] ? copy_mount_options+0x18b/0x2e0 [ 590.620038] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 590.624857] ? copy_mount_options+0x1f7/0x2e0 [ 590.629331] SyS_mount+0xab/0x120 [ 590.632758] ? copy_mnt_ns+0xb30/0xb30 [ 590.636625] do_syscall_64+0x281/0x940 [ 590.640494] ? __do_page_fault+0xc90/0xc90 [ 590.644702] ? _raw_spin_unlock_irq+0x27/0x70 [ 590.649171] ? finish_task_switch+0x1c1/0x7e0 [ 590.653643] ? syscall_return_slowpath+0x550/0x550 [ 590.658552] ? syscall_return_slowpath+0x2ac/0x550 [ 590.663465] ? prepare_exit_to_usermode+0x350/0x350 [ 590.668468] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 590.673816] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 590.678643] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 590.683808] RIP: 0033:0x4548b9 [ 590.686973] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 10:49:40 executing program 4 (fault-call:12 fault-nth:21): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 590.694654] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 590.701898] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 590.709144] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 590.716388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 590.723634] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 [ 590.755329] FAULT_INJECTION: forcing a failure. [ 590.755329] name failslab, interval 1, probability 0, space 0, times 0 [ 590.766611] CPU: 1 PID: 26292 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 590.773872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.783209] Call Trace: [ 590.785789] dump_stack+0x194/0x24d [ 590.789401] ? arch_local_irq_restore+0x53/0x53 [ 590.794047] ? kernel_text_address+0x102/0x140 [ 590.798621] should_fail+0x8c0/0xa40 [ 590.802314] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 590.807408] ? save_stack+0x43/0xd0 [ 590.811009] ? kasan_kmalloc+0xad/0xe0 [ 590.814875] ? __kmalloc+0x162/0x760 [ 590.818563] ? __list_lru_init+0xcf/0x750 [ 590.822712] ? find_held_lock+0x35/0x1d0 [ 590.826754] ? __lock_is_held+0xb6/0x140 [ 590.830805] ? check_same_owner+0x320/0x320 [ 590.835107] ? rcu_note_context_switch+0x710/0x710 [ 590.840028] should_failslab+0xec/0x120 [ 590.843978] kmem_cache_alloc_node_trace+0x5a/0x760 [ 590.848972] ? mark_held_locks+0xaf/0x100 [ 590.853097] ? __raw_spin_lock_init+0x1c/0x100 [ 590.857661] __kmalloc_node+0x33/0x70 [ 590.861442] kvmalloc_node+0x99/0xd0 [ 590.865138] __list_lru_init+0x5d5/0x750 [ 590.869183] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 590.875045] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 590.880063] ? lockdep_init_map+0x9/0x10 [ 590.884102] sget_userns+0x6b1/0xe40 [ 590.887790] ? set_anon_super+0x20/0x20 [ 590.891745] ? put_filp+0x90/0x90 [ 590.895176] ? destroy_unused_super.part.6+0xd0/0xd0 [ 590.900260] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 590.905257] ? trace_hardirqs_off+0x10/0x10 [ 590.909558] ? putname+0xee/0x130 [ 590.912991] ? cap_capable+0x1b5/0x230 [ 590.916862] ? security_capable+0x8e/0xc0 [ 590.920990] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 590.926158] ? ns_capable_common+0xcf/0x160 [ 590.930460] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 590.935623] mount_ns+0x6d/0x190 [ 590.938974] rpc_mount+0x9e/0xd0 [ 590.942319] mount_fs+0x66/0x2d0 [ 590.945666] vfs_kern_mount.part.26+0xc6/0x4a0 [ 590.950224] ? may_umount+0xa0/0xa0 [ 590.953830] ? _raw_read_unlock+0x22/0x30 [ 590.957951] ? __get_fs_type+0x8a/0xc0 [ 590.961823] do_mount+0xea4/0x2bb0 [ 590.965347] ? copy_mount_string+0x40/0x40 [ 590.969559] ? rcu_pm_notify+0xc0/0xc0 [ 590.973433] ? copy_mount_options+0x5f/0x2e0 [ 590.977820] ? rcu_read_lock_sched_held+0x108/0x120 [ 590.982812] ? kmem_cache_alloc_trace+0x459/0x740 [ 590.987642] ? kasan_check_write+0x14/0x20 [ 590.992386] ? _copy_from_user+0x99/0x110 [ 590.996519] ? copy_mount_options+0x1f7/0x2e0 [ 591.000996] SyS_mount+0xab/0x120 [ 591.004429] ? copy_mnt_ns+0xb30/0xb30 [ 591.008296] do_syscall_64+0x281/0x940 [ 591.012161] ? __do_page_fault+0xc90/0xc90 [ 591.016372] ? _raw_spin_unlock_irq+0x27/0x70 [ 591.020843] ? finish_task_switch+0x1c1/0x7e0 [ 591.025320] ? syscall_return_slowpath+0x550/0x550 [ 591.030225] ? syscall_return_slowpath+0x2ac/0x550 [ 591.035133] ? prepare_exit_to_usermode+0x350/0x350 [ 591.040126] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 591.045472] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 591.050297] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 10:49:40 executing program 4 (fault-call:12 fault-nth:22): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 591.055466] RIP: 0033:0x4548b9 [ 591.058632] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 591.066318] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 591.073565] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 591.080813] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 591.088058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 591.095305] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 [ 591.134799] FAULT_INJECTION: forcing a failure. [ 591.134799] name failslab, interval 1, probability 0, space 0, times 0 [ 591.146093] CPU: 1 PID: 26295 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 591.153357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.162695] Call Trace: [ 591.165274] dump_stack+0x194/0x24d [ 591.168885] ? arch_local_irq_restore+0x53/0x53 [ 591.173537] ? rcutorture_record_progress+0x10/0x10 [ 591.178540] should_fail+0x8c0/0xa40 [ 591.182235] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 591.187313] ? __kernel_text_address+0xd/0x40 [ 591.191787] ? unwind_get_return_address+0x61/0xa0 [ 591.196712] ? find_held_lock+0x35/0x1d0 [ 591.200756] ? __lock_is_held+0xb6/0x140 [ 591.204807] ? check_same_owner+0x320/0x320 [ 591.209107] ? rcu_note_context_switch+0x710/0x710 [ 591.214033] should_failslab+0xec/0x120 [ 591.217983] kmem_cache_alloc_trace+0x4b/0x740 [ 591.222543] ? __kmalloc_node+0x33/0x70 [ 591.226491] ? __kmalloc_node+0x33/0x70 [ 591.230441] ? rcu_read_lock_sched_held+0x108/0x120 [ 591.235444] __memcg_init_list_lru_node+0x169/0x270 [ 591.240442] ? list_lru_add+0x7c0/0x7c0 [ 591.244390] ? __kmalloc_node+0x47/0x70 [ 591.248353] __list_lru_init+0x544/0x750 [ 591.252399] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 591.258264] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 591.263265] ? lockdep_init_map+0x9/0x10 [ 591.267308] sget_userns+0x6b1/0xe40 [ 591.270996] ? set_anon_super+0x20/0x20 [ 591.274960] ? put_filp+0x90/0x90 [ 591.278391] ? destroy_unused_super.part.6+0xd0/0xd0 [ 591.283472] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 591.288469] ? trace_hardirqs_off+0x10/0x10 [ 591.292770] ? putname+0xee/0x130 [ 591.296205] ? cap_capable+0x1b5/0x230 [ 591.300076] ? security_capable+0x8e/0xc0 [ 591.304204] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 591.309369] ? ns_capable_common+0xcf/0x160 [ 591.313669] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 591.318832] mount_ns+0x6d/0x190 [ 591.322182] rpc_mount+0x9e/0xd0 [ 591.325529] mount_fs+0x66/0x2d0 [ 591.328881] vfs_kern_mount.part.26+0xc6/0x4a0 [ 591.333443] ? may_umount+0xa0/0xa0 [ 591.337047] ? _raw_read_unlock+0x22/0x30 [ 591.341175] ? __get_fs_type+0x8a/0xc0 [ 591.345050] do_mount+0xea4/0x2bb0 [ 591.348577] ? copy_mount_string+0x40/0x40 [ 591.352790] ? rcu_pm_notify+0xc0/0xc0 [ 591.356666] ? copy_mount_options+0x5f/0x2e0 [ 591.361051] ? rcu_read_lock_sched_held+0x108/0x120 [ 591.366046] ? kmem_cache_alloc_trace+0x459/0x740 [ 591.370866] ? kasan_check_write+0x14/0x20 [ 591.375078] ? _copy_from_user+0x99/0x110 [ 591.379209] ? copy_mount_options+0x1f7/0x2e0 [ 591.383684] SyS_mount+0xab/0x120 [ 591.387115] ? copy_mnt_ns+0xb30/0xb30 [ 591.390983] do_syscall_64+0x281/0x940 [ 591.394851] ? __do_page_fault+0xc90/0xc90 [ 591.399060] ? _raw_spin_unlock_irq+0x27/0x70 [ 591.403534] ? finish_task_switch+0x1c1/0x7e0 [ 591.408012] ? syscall_return_slowpath+0x550/0x550 [ 591.412921] ? syscall_return_slowpath+0x2ac/0x550 [ 591.417829] ? prepare_exit_to_usermode+0x350/0x350 [ 591.422821] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 591.428167] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/29 10:49:41 executing program 4 (fault-call:12 fault-nth:23): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 591.432991] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 591.438164] RIP: 0033:0x4548b9 [ 591.441330] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 591.449022] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 591.456270] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 591.463525] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 591.470773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 591.478024] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 [ 591.518767] FAULT_INJECTION: forcing a failure. [ 591.518767] name failslab, interval 1, probability 0, space 0, times 0 [ 591.530075] CPU: 1 PID: 26298 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 591.537334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.546675] Call Trace: [ 591.549250] dump_stack+0x194/0x24d [ 591.552859] ? arch_local_irq_restore+0x53/0x53 [ 591.557505] ? __save_stack_trace+0x7e/0xd0 [ 591.561816] should_fail+0x8c0/0xa40 [ 591.565510] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 591.570592] ? kasan_kmalloc+0xad/0xe0 [ 591.574454] ? kmem_cache_alloc_trace+0x136/0x740 [ 591.579271] ? __memcg_init_list_lru_node+0x169/0x270 [ 591.584433] ? __list_lru_init+0x544/0x750 [ 591.588640] ? sget_userns+0x6b1/0xe40 [ 591.592504] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 591.597233] ? do_mount+0xea4/0x2bb0 [ 591.600919] ? SyS_mount+0xab/0x120 [ 591.604519] ? do_syscall_64+0x281/0x940 [ 591.608555] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 591.613900] ? find_held_lock+0x35/0x1d0 [ 591.617942] ? __lock_is_held+0xb6/0x140 [ 591.621997] ? check_same_owner+0x320/0x320 [ 591.626306] ? rcu_note_context_switch+0x710/0x710 [ 591.631222] should_failslab+0xec/0x120 [ 591.635174] kmem_cache_alloc_trace+0x4b/0x740 [ 591.639731] ? __kmalloc_node+0x33/0x70 [ 591.643679] ? __kmalloc_node+0x33/0x70 [ 591.647631] ? rcu_read_lock_sched_held+0x108/0x120 [ 591.652628] __memcg_init_list_lru_node+0x169/0x270 [ 591.657625] ? list_lru_add+0x7c0/0x7c0 [ 591.661576] ? __kmalloc_node+0x47/0x70 [ 591.665531] __list_lru_init+0x544/0x750 [ 591.669576] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 591.675439] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 591.680439] ? lockdep_init_map+0x9/0x10 [ 591.684483] sget_userns+0x6b1/0xe40 [ 591.688174] ? set_anon_super+0x20/0x20 [ 591.692132] ? put_filp+0x90/0x90 [ 591.695563] ? destroy_unused_super.part.6+0xd0/0xd0 [ 591.700646] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 591.705644] ? trace_hardirqs_off+0x10/0x10 [ 591.709943] ? putname+0xee/0x130 [ 591.713376] ? cap_capable+0x1b5/0x230 [ 591.717248] ? security_capable+0x8e/0xc0 [ 591.721376] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 591.726540] ? ns_capable_common+0xcf/0x160 [ 591.730843] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 591.736011] mount_ns+0x6d/0x190 [ 591.739361] rpc_mount+0x9e/0xd0 [ 591.742708] mount_fs+0x66/0x2d0 [ 591.746055] vfs_kern_mount.part.26+0xc6/0x4a0 [ 591.750613] ? may_umount+0xa0/0xa0 [ 591.754216] ? _raw_read_unlock+0x22/0x30 [ 591.758343] ? __get_fs_type+0x8a/0xc0 [ 591.762213] do_mount+0xea4/0x2bb0 [ 591.765738] ? copy_mount_string+0x40/0x40 [ 591.769949] ? rcu_pm_notify+0xc0/0xc0 [ 591.773826] ? copy_mount_options+0x5f/0x2e0 [ 591.778211] ? rcu_read_lock_sched_held+0x108/0x120 [ 591.783202] ? kmem_cache_alloc_trace+0x459/0x740 [ 591.788199] ? kasan_check_write+0x14/0x20 [ 591.792411] ? _copy_from_user+0x99/0x110 [ 591.796540] ? copy_mount_options+0x1f7/0x2e0 [ 591.801021] SyS_mount+0xab/0x120 [ 591.804449] ? copy_mnt_ns+0xb30/0xb30 [ 591.808320] do_syscall_64+0x281/0x940 [ 591.812183] ? __do_page_fault+0xc90/0xc90 [ 591.816390] ? _raw_spin_unlock_irq+0x27/0x70 [ 591.820862] ? finish_task_switch+0x1c1/0x7e0 [ 591.825332] ? syscall_return_slowpath+0x550/0x550 [ 591.830239] ? syscall_return_slowpath+0x2ac/0x550 [ 591.835146] ? prepare_exit_to_usermode+0x350/0x350 [ 591.840140] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 591.845485] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 591.850309] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 591.855474] RIP: 0033:0x4548b9 [ 591.858636] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 10:49:41 executing program 4 (fault-call:12 fault-nth:24): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 591.866318] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 591.873563] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 591.880810] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 591.888056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 591.895303] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 [ 591.934675] FAULT_INJECTION: forcing a failure. [ 591.934675] name failslab, interval 1, probability 0, space 0, times 0 [ 591.945933] CPU: 1 PID: 26301 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 591.953197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.962534] Call Trace: [ 591.965111] dump_stack+0x194/0x24d [ 591.968720] ? arch_local_irq_restore+0x53/0x53 [ 591.973368] ? rcutorture_record_progress+0x10/0x10 [ 591.978371] should_fail+0x8c0/0xa40 [ 591.982066] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 591.987145] ? __kernel_text_address+0xd/0x40 [ 591.991616] ? unwind_get_return_address+0x61/0xa0 [ 591.996538] ? find_held_lock+0x35/0x1d0 [ 592.000583] ? __lock_is_held+0xb6/0x140 [ 592.004635] ? check_same_owner+0x320/0x320 [ 592.008938] ? rcu_note_context_switch+0x710/0x710 [ 592.013856] should_failslab+0xec/0x120 [ 592.017810] kmem_cache_alloc_trace+0x4b/0x740 [ 592.022369] ? __kmalloc_node+0x33/0x70 [ 592.026317] ? __kmalloc_node+0x33/0x70 [ 592.030269] ? rcu_read_lock_sched_held+0x108/0x120 [ 592.035266] __memcg_init_list_lru_node+0x169/0x270 [ 592.040261] ? list_lru_add+0x7c0/0x7c0 [ 592.044213] ? __kmalloc_node+0x47/0x70 [ 592.048173] __list_lru_init+0x544/0x750 [ 592.052217] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 592.058079] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 592.063081] ? lockdep_init_map+0x9/0x10 [ 592.067119] sget_userns+0x6b1/0xe40 [ 592.070806] ? set_anon_super+0x20/0x20 [ 592.074761] ? put_filp+0x90/0x90 [ 592.078193] ? destroy_unused_super.part.6+0xd0/0xd0 [ 592.083275] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 592.088275] ? trace_hardirqs_off+0x10/0x10 [ 592.092576] ? putname+0xee/0x130 [ 592.096014] ? cap_capable+0x1b5/0x230 [ 592.099887] ? security_capable+0x8e/0xc0 [ 592.104018] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 592.109185] ? ns_capable_common+0xcf/0x160 [ 592.113488] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 592.118653] mount_ns+0x6d/0x190 [ 592.121999] rpc_mount+0x9e/0xd0 [ 592.125351] mount_fs+0x66/0x2d0 [ 592.128697] vfs_kern_mount.part.26+0xc6/0x4a0 [ 592.133259] ? may_umount+0xa0/0xa0 [ 592.136860] ? _raw_read_unlock+0x22/0x30 [ 592.140983] ? __get_fs_type+0x8a/0xc0 [ 592.144856] do_mount+0xea4/0x2bb0 [ 592.148380] ? copy_mount_string+0x40/0x40 [ 592.152589] ? rcu_pm_notify+0xc0/0xc0 [ 592.156464] ? copy_mount_options+0x5f/0x2e0 [ 592.160847] ? rcu_read_lock_sched_held+0x108/0x120 [ 592.165837] ? kmem_cache_alloc_trace+0x459/0x740 [ 592.170657] ? kasan_check_write+0x14/0x20 [ 592.174876] ? copy_mount_options+0x1f7/0x2e0 [ 592.179362] SyS_mount+0xab/0x120 [ 592.182789] ? copy_mnt_ns+0xb30/0xb30 [ 592.186653] do_syscall_64+0x281/0x940 [ 592.190516] ? __do_page_fault+0xc90/0xc90 [ 592.194724] ? _raw_spin_unlock_irq+0x27/0x70 [ 592.199195] ? finish_task_switch+0x1c1/0x7e0 [ 592.203669] ? syscall_return_slowpath+0x550/0x550 [ 592.208573] ? syscall_return_slowpath+0x2ac/0x550 [ 592.213478] ? prepare_exit_to_usermode+0x350/0x350 [ 592.218472] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 592.223815] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 592.228643] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 592.233805] RIP: 0033:0x4548b9 [ 592.236969] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 592.244651] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 592.252242] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 592.259486] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 592.266729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 592.273976] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 [ 593.193073] IPVS: ftp: loaded support on port[0] = 21 [ 593.219866] IPVS: ftp: loaded support on port[0] = 21 [ 593.255592] IPVS: ftp: loaded support on port[0] = 21 [ 593.300284] IPVS: ftp: loaded support on port[0] = 21 [ 593.343858] IPVS: ftp: loaded support on port[0] = 21 [ 593.384566] IPVS: ftp: loaded support on port[0] = 21 [ 593.427633] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:49:43 executing program 4 (fault-call:12 fault-nth:25): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/29 10:49:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea20"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:43 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x11, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:43 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:43 executing program 0 (fault-call:9 fault-nth:0): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/29 10:49:43 executing program 6: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x12, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000031960000000000000000f00755f6100005000000000000000000160095000000000000000000000000000000e872fcff0800000000000000000200009500000000000063ea209457de6ca97b9baeed17ded45c7f456cc5456ebce1c9d0728cb69b1733c7c8066dd1cfdc9cee26d1b879524e11d0044bdc104ccfa14bd28249821bde27c76fbc057e3d18624d6e2b0c2450a1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000400)=""/63, 0x41000}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000640)) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x2003fffff, &(0x7f0000000380)="09a61cf58bf80ac51a1e74daf9e1dc4dfb75e26c5703000000f2fbf64637e86f1f903fb04e04bbb6e32d04") bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 593.561931] FAULT_INJECTION: forcing a failure. [ 593.561931] name failslab, interval 1, probability 0, space 0, times 0 [ 593.573354] CPU: 0 PID: 26319 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 593.580628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.589979] Call Trace: [ 593.592574] dump_stack+0x194/0x24d [ 593.596213] ? arch_local_irq_restore+0x53/0x53 [ 593.600876] ? __save_stack_trace+0x7e/0xd0 [ 593.605206] should_fail+0x8c0/0xa40 [ 593.608918] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 593.614013] ? kasan_kmalloc+0xad/0xe0 [ 593.617894] ? kmem_cache_alloc_trace+0x136/0x740 [ 593.622734] ? __memcg_init_list_lru_node+0x169/0x270 [ 593.627928] ? __list_lru_init+0x544/0x750 [ 593.632159] ? sget_userns+0x6b1/0xe40 [ 593.636054] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 593.640807] ? do_mount+0xea4/0x2bb0 [ 593.644510] ? SyS_mount+0xab/0x120 [ 593.648127] ? do_syscall_64+0x281/0x940 [ 593.652177] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 593.657538] ? find_held_lock+0x35/0x1d0 [ 593.661600] ? __lock_is_held+0xb6/0x140 [ 593.665669] ? check_same_owner+0x320/0x320 [ 593.669986] ? rcu_note_context_switch+0x710/0x710 [ 593.674917] should_failslab+0xec/0x120 [ 593.678884] kmem_cache_alloc_trace+0x4b/0x740 [ 593.683460] ? __kmalloc_node+0x33/0x70 [ 593.687427] ? __kmalloc_node+0x33/0x70 [ 593.691397] ? rcu_read_lock_sched_held+0x108/0x120 [ 593.696417] __memcg_init_list_lru_node+0x169/0x270 [ 593.701433] ? list_lru_add+0x7c0/0x7c0 [ 593.705398] ? __kmalloc_node+0x47/0x70 [ 593.709379] __list_lru_init+0x544/0x750 [ 593.713442] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 593.719328] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 593.724350] ? lockdep_init_map+0x9/0x10 [ 593.728402] sget_userns+0x6b1/0xe40 [ 593.732090] ? set_anon_super+0x20/0x20 [ 593.736052] ? put_filp+0x90/0x90 [ 593.739482] ? destroy_unused_super.part.6+0xd0/0xd0 [ 593.744561] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 593.749557] ? trace_hardirqs_off+0x10/0x10 [ 593.753857] ? putname+0xee/0x130 [ 593.757291] ? cap_capable+0x1b5/0x230 [ 593.761160] ? security_capable+0x8e/0xc0 [ 593.765291] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 593.770455] ? ns_capable_common+0xcf/0x160 [ 593.774756] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 593.779918] mount_ns+0x6d/0x190 [ 593.783264] rpc_mount+0x9e/0xd0 [ 593.786609] mount_fs+0x66/0x2d0 [ 593.789954] vfs_kern_mount.part.26+0xc6/0x4a0 [ 593.794513] ? may_umount+0xa0/0xa0 [ 593.798115] ? _raw_read_unlock+0x22/0x30 [ 593.802236] ? __get_fs_type+0x8a/0xc0 [ 593.806105] do_mount+0xea4/0x2bb0 [ 593.809628] ? copy_mount_string+0x40/0x40 [ 593.813836] ? rcu_pm_notify+0xc0/0xc0 [ 593.817706] ? copy_mount_options+0x5f/0x2e0 [ 593.822090] ? rcu_read_lock_sched_held+0x108/0x120 [ 593.827083] ? kmem_cache_alloc_trace+0x459/0x740 [ 593.831899] ? kasan_check_write+0x14/0x20 [ 593.836111] ? _copy_from_user+0x99/0x110 [ 593.840237] ? copy_mount_options+0x1f7/0x2e0 [ 593.844710] SyS_mount+0xab/0x120 [ 593.848137] ? copy_mnt_ns+0xb30/0xb30 [ 593.852001] do_syscall_64+0x281/0x940 [ 593.855867] ? __do_page_fault+0xc90/0xc90 [ 593.860086] ? _raw_spin_unlock_irq+0x27/0x70 [ 593.864565] ? finish_task_switch+0x1c1/0x7e0 [ 593.869046] ? syscall_return_slowpath+0x550/0x550 [ 593.873953] ? syscall_return_slowpath+0x2ac/0x550 [ 593.878857] ? prepare_exit_to_usermode+0x350/0x350 [ 593.883861] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 593.889206] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 593.894040] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 593.899202] RIP: 0033:0x4548b9 [ 593.902366] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 10:49:43 executing program 4 (fault-call:12 fault-nth:26): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 593.910049] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 593.917293] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 593.924537] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 593.931779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 593.939031] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 [ 593.976161] FAULT_INJECTION: forcing a failure. [ 593.976161] name failslab, interval 1, probability 0, space 0, times 0 [ 593.987397] CPU: 0 PID: 26323 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 593.994647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.003987] Call Trace: [ 594.006563] dump_stack+0x194/0x24d [ 594.010172] ? arch_local_irq_restore+0x53/0x53 [ 594.014821] ? __save_stack_trace+0x7e/0xd0 [ 594.019131] should_fail+0x8c0/0xa40 [ 594.022826] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 594.027904] ? kasan_kmalloc+0xad/0xe0 [ 594.031765] ? kmem_cache_alloc_trace+0x136/0x740 [ 594.036581] ? __memcg_init_list_lru_node+0x169/0x270 [ 594.041745] ? __list_lru_init+0x544/0x750 [ 594.045954] ? sget_userns+0x6b1/0xe40 [ 594.049817] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 594.054549] ? do_mount+0xea4/0x2bb0 [ 594.058242] ? SyS_mount+0xab/0x120 [ 594.061845] ? do_syscall_64+0x281/0x940 [ 594.065880] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 594.071225] ? find_held_lock+0x35/0x1d0 [ 594.075273] ? __lock_is_held+0xb6/0x140 [ 594.079326] ? check_same_owner+0x320/0x320 [ 594.083628] ? rcu_note_context_switch+0x710/0x710 [ 594.088544] should_failslab+0xec/0x120 [ 594.092493] kmem_cache_alloc_trace+0x4b/0x740 [ 594.097049] ? __kmalloc_node+0x33/0x70 [ 594.100998] ? __kmalloc_node+0x33/0x70 [ 594.104952] ? rcu_read_lock_sched_held+0x108/0x120 [ 594.109954] __memcg_init_list_lru_node+0x169/0x270 [ 594.114950] ? list_lru_add+0x7c0/0x7c0 [ 594.118902] ? __kmalloc_node+0x47/0x70 [ 594.122862] __list_lru_init+0x544/0x750 [ 594.126908] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 594.132772] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 594.137771] ? lockdep_init_map+0x9/0x10 [ 594.141813] sget_userns+0x6b1/0xe40 [ 594.145502] ? set_anon_super+0x20/0x20 [ 594.149456] ? put_filp+0x90/0x90 [ 594.152886] ? destroy_unused_super.part.6+0xd0/0xd0 [ 594.157970] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 594.162966] ? trace_hardirqs_off+0x10/0x10 [ 594.167269] ? putname+0xee/0x130 [ 594.170703] ? cap_capable+0x1b5/0x230 [ 594.174575] ? security_capable+0x8e/0xc0 [ 594.178702] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 594.183865] ? ns_capable_common+0xcf/0x160 [ 594.188173] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 594.193338] mount_ns+0x6d/0x190 [ 594.196685] rpc_mount+0x9e/0xd0 [ 594.200035] mount_fs+0x66/0x2d0 [ 594.203384] vfs_kern_mount.part.26+0xc6/0x4a0 [ 594.207945] ? may_umount+0xa0/0xa0 [ 594.211549] ? _raw_read_unlock+0x22/0x30 [ 594.215673] ? __get_fs_type+0x8a/0xc0 [ 594.219542] do_mount+0xea4/0x2bb0 [ 594.223067] ? copy_mount_string+0x40/0x40 [ 594.227278] ? rcu_pm_notify+0xc0/0xc0 [ 594.231155] ? copy_mount_options+0x5f/0x2e0 [ 594.235541] ? rcu_read_lock_sched_held+0x108/0x120 [ 594.240533] ? kmem_cache_alloc_trace+0x459/0x740 [ 594.245356] ? kasan_check_write+0x14/0x20 [ 594.249568] ? _copy_from_user+0x99/0x110 [ 594.253697] ? copy_mount_options+0x1f7/0x2e0 [ 594.258172] SyS_mount+0xab/0x120 [ 594.261601] ? copy_mnt_ns+0xb30/0xb30 [ 594.265469] do_syscall_64+0x281/0x940 [ 594.269334] ? __do_page_fault+0xc90/0xc90 [ 594.273542] ? _raw_spin_unlock_irq+0x27/0x70 [ 594.278017] ? finish_task_switch+0x1c1/0x7e0 [ 594.282492] ? syscall_return_slowpath+0x550/0x550 [ 594.287396] ? syscall_return_slowpath+0x2ac/0x550 [ 594.292304] ? prepare_exit_to_usermode+0x350/0x350 [ 594.297296] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 594.302640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 594.307467] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 594.312630] RIP: 0033:0x4548b9 [ 594.315795] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 10:49:44 executing program 4 (fault-call:12 fault-nth:27): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 594.323479] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 594.330724] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 594.337970] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 594.345216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 594.352462] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a [ 594.399257] FAULT_INJECTION: forcing a failure. [ 594.399257] name failslab, interval 1, probability 0, space 0, times 0 [ 594.410704] CPU: 1 PID: 26326 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 594.417977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.427316] Call Trace: [ 594.429896] dump_stack+0x194/0x24d [ 594.433506] ? arch_local_irq_restore+0x53/0x53 [ 594.438152] ? __save_stack_trace+0x7e/0xd0 [ 594.442460] should_fail+0x8c0/0xa40 [ 594.446154] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 594.451236] ? kasan_kmalloc+0xad/0xe0 [ 594.455098] ? kmem_cache_alloc_trace+0x136/0x740 [ 594.459916] ? __memcg_init_list_lru_node+0x169/0x270 [ 594.465081] ? __list_lru_init+0x544/0x750 [ 594.469290] ? sget_userns+0x6b1/0xe40 [ 594.473154] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 594.477887] ? do_mount+0xea4/0x2bb0 [ 594.481574] ? SyS_mount+0xab/0x120 [ 594.485178] ? do_syscall_64+0x281/0x940 [ 594.489215] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 594.494561] ? find_held_lock+0x35/0x1d0 [ 594.498603] ? __lock_is_held+0xb6/0x140 [ 594.502656] ? check_same_owner+0x320/0x320 [ 594.506957] ? rcu_note_context_switch+0x710/0x710 [ 594.511873] should_failslab+0xec/0x120 [ 594.515825] kmem_cache_alloc_trace+0x4b/0x740 [ 594.520384] ? __kmalloc_node+0x33/0x70 [ 594.524334] ? __kmalloc_node+0x33/0x70 [ 594.528286] ? rcu_read_lock_sched_held+0x108/0x120 [ 594.533286] __memcg_init_list_lru_node+0x169/0x270 [ 594.538282] ? list_lru_add+0x7c0/0x7c0 [ 594.542231] ? __kmalloc_node+0x47/0x70 [ 594.546192] __list_lru_init+0x544/0x750 [ 594.550237] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 594.556099] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 594.561102] ? lockdep_init_map+0x9/0x10 [ 594.565141] sget_userns+0x6b1/0xe40 [ 594.568829] ? set_anon_super+0x20/0x20 [ 594.572787] ? put_filp+0x90/0x90 [ 594.576221] ? destroy_unused_super.part.6+0xd0/0xd0 [ 594.581303] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 594.586299] ? trace_hardirqs_off+0x10/0x10 [ 594.590598] ? putname+0xee/0x130 [ 594.594035] ? cap_capable+0x1b5/0x230 [ 594.597907] ? security_capable+0x8e/0xc0 [ 594.602035] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 594.607199] ? ns_capable_common+0xcf/0x160 [ 594.611500] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 594.616672] mount_ns+0x6d/0x190 [ 594.620025] rpc_mount+0x9e/0xd0 [ 594.623370] mount_fs+0x66/0x2d0 [ 594.626720] vfs_kern_mount.part.26+0xc6/0x4a0 [ 594.631281] ? may_umount+0xa0/0xa0 [ 594.634884] ? _raw_read_unlock+0x22/0x30 [ 594.639014] ? __get_fs_type+0x8a/0xc0 [ 594.642887] do_mount+0xea4/0x2bb0 [ 594.646417] ? copy_mount_string+0x40/0x40 [ 594.650627] ? rcu_pm_notify+0xc0/0xc0 [ 594.654501] ? copy_mount_options+0x5f/0x2e0 [ 594.658887] ? rcu_read_lock_sched_held+0x108/0x120 [ 594.663881] ? kmem_cache_alloc_trace+0x459/0x740 [ 594.668701] ? kasan_check_write+0x14/0x20 [ 594.672917] ? _copy_from_user+0x99/0x110 [ 594.677047] ? copy_mount_options+0x1f7/0x2e0 [ 594.681525] SyS_mount+0xab/0x120 [ 594.684952] ? copy_mnt_ns+0xb30/0xb30 [ 594.688818] do_syscall_64+0x281/0x940 [ 594.692679] ? __do_page_fault+0xc90/0xc90 [ 594.696891] ? finish_task_switch+0x1c1/0x7e0 [ 594.701365] ? syscall_return_slowpath+0x550/0x550 [ 594.706272] ? syscall_return_slowpath+0x2ac/0x550 [ 594.711177] ? prepare_exit_to_usermode+0x350/0x350 [ 594.716171] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 594.721515] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 594.726340] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 594.731506] RIP: 0033:0x4548b9 [ 594.734670] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 594.742352] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 2018/03/29 10:49:44 executing program 4 (fault-call:12 fault-nth:28): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 594.749596] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 594.756841] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 594.764085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 594.771329] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b [ 594.866115] FAULT_INJECTION: forcing a failure. [ 594.866115] name failslab, interval 1, probability 0, space 0, times 0 [ 594.877443] CPU: 0 PID: 26337 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 594.884723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.894054] Call Trace: [ 594.896623] dump_stack+0x194/0x24d [ 594.900231] ? arch_local_irq_restore+0x53/0x53 [ 594.904877] ? __save_stack_trace+0x7e/0xd0 [ 594.909185] should_fail+0x8c0/0xa40 [ 594.912880] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 594.917956] ? kasan_kmalloc+0xad/0xe0 [ 594.921814] ? kmem_cache_alloc_trace+0x136/0x740 [ 594.926632] ? __memcg_init_list_lru_node+0x169/0x270 [ 594.931810] ? __list_lru_init+0x544/0x750 [ 594.936025] ? sget_userns+0x6b1/0xe40 [ 594.939903] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 594.944638] ? do_mount+0xea4/0x2bb0 [ 594.948322] ? SyS_mount+0xab/0x120 [ 594.951923] ? do_syscall_64+0x281/0x940 [ 594.955956] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 594.961299] ? find_held_lock+0x35/0x1d0 [ 594.965338] ? __lock_is_held+0xb6/0x140 [ 594.969384] ? check_same_owner+0x320/0x320 [ 594.973685] ? rcu_note_context_switch+0x710/0x710 [ 594.978597] should_failslab+0xec/0x120 [ 594.982547] kmem_cache_alloc_trace+0x4b/0x740 [ 594.987101] ? __kmalloc_node+0x33/0x70 [ 594.991052] ? __kmalloc_node+0x33/0x70 [ 594.995001] ? rcu_read_lock_sched_held+0x108/0x120 [ 595.000008] __memcg_init_list_lru_node+0x169/0x270 [ 595.005015] ? list_lru_add+0x7c0/0x7c0 [ 595.008979] ? __kmalloc_node+0x47/0x70 [ 595.012938] __list_lru_init+0x544/0x750 [ 595.016981] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 595.022843] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 595.027839] ? lockdep_init_map+0x9/0x10 [ 595.031878] sget_userns+0x6b1/0xe40 [ 595.035565] ? set_anon_super+0x20/0x20 [ 595.039518] ? put_filp+0x90/0x90 [ 595.042954] ? destroy_unused_super.part.6+0xd0/0xd0 [ 595.048040] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 595.053040] ? trace_hardirqs_off+0x10/0x10 [ 595.057336] ? putname+0xee/0x130 [ 595.060769] ? cap_capable+0x1b5/0x230 [ 595.064636] ? security_capable+0x8e/0xc0 [ 595.068771] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 595.073937] ? ns_capable_common+0xcf/0x160 [ 595.078235] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 595.083397] mount_ns+0x6d/0x190 [ 595.086744] rpc_mount+0x9e/0xd0 [ 595.090086] mount_fs+0x66/0x2d0 [ 595.093431] vfs_kern_mount.part.26+0xc6/0x4a0 [ 595.097989] ? may_umount+0xa0/0xa0 [ 595.101593] ? _raw_read_unlock+0x22/0x30 [ 595.105722] ? __get_fs_type+0x8a/0xc0 [ 595.109595] do_mount+0xea4/0x2bb0 [ 595.113115] ? copy_mount_string+0x40/0x40 [ 595.117326] ? rcu_pm_notify+0xc0/0xc0 [ 595.121195] ? copy_mount_options+0x5f/0x2e0 [ 595.125579] ? rcu_read_lock_sched_held+0x108/0x120 [ 595.130579] ? kmem_cache_alloc_trace+0x459/0x740 [ 595.135408] ? copy_mount_options+0x1f7/0x2e0 [ 595.139880] SyS_mount+0xab/0x120 [ 595.143308] ? copy_mnt_ns+0xb30/0xb30 [ 595.147174] do_syscall_64+0x281/0x940 [ 595.151040] ? __do_page_fault+0xc90/0xc90 [ 595.155559] ? _raw_spin_unlock_irq+0x27/0x70 [ 595.160045] ? finish_task_switch+0x1c1/0x7e0 [ 595.164521] ? syscall_return_slowpath+0x550/0x550 [ 595.169440] ? syscall_return_slowpath+0x2ac/0x550 [ 595.174343] ? prepare_exit_to_usermode+0x350/0x350 [ 595.179335] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 595.184680] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 595.189505] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 595.194671] RIP: 0033:0x4548b9 [ 595.197835] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 595.205519] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 2018/03/29 10:49:44 executing program 4 (fault-call:12 fault-nth:29): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 595.212762] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 595.220005] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 595.227255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 595.234500] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c [ 595.268903] FAULT_INJECTION: forcing a failure. [ 595.268903] name failslab, interval 1, probability 0, space 0, times 0 [ 595.280178] CPU: 1 PID: 26343 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 595.287459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.296804] Call Trace: [ 595.299379] dump_stack+0x194/0x24d [ 595.302989] ? arch_local_irq_restore+0x53/0x53 [ 595.307636] ? __save_stack_trace+0x7e/0xd0 [ 595.311946] should_fail+0x8c0/0xa40 [ 595.315638] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 595.320982] ? kasan_kmalloc+0xad/0xe0 [ 595.324844] ? kmem_cache_alloc_trace+0x136/0x740 [ 595.329662] ? __memcg_init_list_lru_node+0x169/0x270 [ 595.334824] ? __list_lru_init+0x544/0x750 [ 595.339038] ? sget_userns+0x6b1/0xe40 [ 595.342903] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 595.347632] ? do_mount+0xea4/0x2bb0 [ 595.351321] ? SyS_mount+0xab/0x120 [ 595.354921] ? do_syscall_64+0x281/0x940 [ 595.358957] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 595.364296] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 595.369034] ? find_held_lock+0x35/0x1d0 [ 595.373076] ? __lock_is_held+0xb6/0x140 [ 595.377128] ? check_same_owner+0x320/0x320 [ 595.381429] ? rcu_note_context_switch+0x710/0x710 [ 595.386345] should_failslab+0xec/0x120 [ 595.390297] kmem_cache_alloc_trace+0x4b/0x740 [ 595.394854] ? __kmalloc_node+0x33/0x70 [ 595.398802] ? __kmalloc_node+0x33/0x70 [ 595.402756] ? rcu_read_lock_sched_held+0x108/0x120 [ 595.407754] __memcg_init_list_lru_node+0x169/0x270 [ 595.412750] ? list_lru_add+0x7c0/0x7c0 [ 595.416702] ? __kmalloc_node+0x47/0x70 [ 595.420661] __list_lru_init+0x544/0x750 [ 595.424703] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 595.430565] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 595.435565] ? lockdep_init_map+0x9/0x10 [ 595.439604] sget_userns+0x6b1/0xe40 [ 595.443290] ? set_anon_super+0x20/0x20 [ 595.447247] ? put_filp+0x90/0x90 [ 595.450680] ? destroy_unused_super.part.6+0xd0/0xd0 [ 595.455763] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 595.460758] ? trace_hardirqs_off+0x10/0x10 [ 595.465060] ? putname+0xee/0x130 [ 595.468492] ? cap_capable+0x1b5/0x230 [ 595.472363] ? security_capable+0x8e/0xc0 [ 595.476492] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 595.481656] ? ns_capable_common+0xcf/0x160 [ 595.485957] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 595.491118] mount_ns+0x6d/0x190 [ 595.494468] rpc_mount+0x9e/0xd0 [ 595.497814] mount_fs+0x66/0x2d0 [ 595.501164] vfs_kern_mount.part.26+0xc6/0x4a0 [ 595.505723] ? may_umount+0xa0/0xa0 [ 595.509327] ? _raw_read_unlock+0x22/0x30 [ 595.513449] ? __get_fs_type+0x8a/0xc0 [ 595.517319] do_mount+0xea4/0x2bb0 [ 595.520844] ? copy_mount_string+0x40/0x40 [ 595.525055] ? rcu_pm_notify+0xc0/0xc0 [ 595.528929] ? copy_mount_options+0x5f/0x2e0 [ 595.533313] ? rcu_read_lock_sched_held+0x108/0x120 [ 595.538309] ? kmem_cache_alloc_trace+0x459/0x740 [ 595.543133] ? kasan_check_write+0x14/0x20 [ 595.547342] ? _copy_from_user+0x99/0x110 [ 595.551472] ? copy_mount_options+0x1f7/0x2e0 [ 595.555952] SyS_mount+0xab/0x120 [ 595.559384] ? copy_mnt_ns+0xb30/0xb30 [ 595.563249] do_syscall_64+0x281/0x940 [ 595.567113] ? __do_page_fault+0xc90/0xc90 [ 595.571323] ? _raw_spin_unlock_irq+0x27/0x70 [ 595.575795] ? finish_task_switch+0x1c1/0x7e0 [ 595.580267] ? syscall_return_slowpath+0x550/0x550 [ 595.585174] ? syscall_return_slowpath+0x2ac/0x550 [ 595.590081] ? prepare_exit_to_usermode+0x350/0x350 [ 595.595077] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 595.600423] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 595.605248] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 595.610412] RIP: 0033:0x4548b9 2018/03/29 10:49:45 executing program 4 (fault-call:12 fault-nth:30): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 595.613576] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 595.621259] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 595.628503] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 595.635753] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 595.642998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 595.650246] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d [ 595.688422] FAULT_INJECTION: forcing a failure. [ 595.688422] name failslab, interval 1, probability 0, space 0, times 0 [ 595.699709] CPU: 1 PID: 26346 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 595.706969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.716304] Call Trace: [ 595.718876] dump_stack+0x194/0x24d [ 595.722484] ? arch_local_irq_restore+0x53/0x53 [ 595.727131] ? __save_stack_trace+0x7e/0xd0 [ 595.731438] should_fail+0x8c0/0xa40 [ 595.735134] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 595.740214] ? kasan_kmalloc+0xad/0xe0 [ 595.744076] ? kmem_cache_alloc_trace+0x136/0x740 [ 595.748893] ? __memcg_init_list_lru_node+0x169/0x270 [ 595.754056] ? __list_lru_init+0x544/0x750 [ 595.758264] ? sget_userns+0x6b1/0xe40 [ 595.762131] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 595.766860] ? do_mount+0xea4/0x2bb0 [ 595.770547] ? SyS_mount+0xab/0x120 [ 595.774151] ? do_syscall_64+0x281/0x940 [ 595.778186] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 595.783530] ? find_held_lock+0x35/0x1d0 [ 595.787581] ? __lock_is_held+0xb6/0x140 [ 595.791650] ? check_same_owner+0x320/0x320 [ 595.795969] ? rcu_note_context_switch+0x710/0x710 [ 595.800886] should_failslab+0xec/0x120 [ 595.804840] kmem_cache_alloc_trace+0x4b/0x740 [ 595.809397] ? __kmalloc_node+0x33/0x70 [ 595.813345] ? __kmalloc_node+0x33/0x70 [ 595.817295] ? rcu_read_lock_sched_held+0x108/0x120 [ 595.822293] __memcg_init_list_lru_node+0x169/0x270 [ 595.827290] ? list_lru_add+0x7c0/0x7c0 [ 595.831239] ? __kmalloc_node+0x47/0x70 [ 595.835199] __list_lru_init+0x544/0x750 [ 595.839244] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 595.845108] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 595.850114] ? lockdep_init_map+0x9/0x10 [ 595.854157] sget_userns+0x6b1/0xe40 [ 595.857846] ? set_anon_super+0x20/0x20 [ 595.861805] ? put_filp+0x90/0x90 [ 595.865237] ? destroy_unused_super.part.6+0xd0/0xd0 [ 595.870318] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 595.875314] ? trace_hardirqs_off+0x10/0x10 [ 595.879615] ? putname+0xee/0x130 [ 595.883050] ? cap_capable+0x1b5/0x230 [ 595.886919] ? security_capable+0x8e/0xc0 [ 595.891047] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 595.896213] ? ns_capable_common+0xcf/0x160 [ 595.900515] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 595.905679] mount_ns+0x6d/0x190 [ 595.909031] rpc_mount+0x9e/0xd0 [ 595.912380] mount_fs+0x66/0x2d0 [ 595.915731] vfs_kern_mount.part.26+0xc6/0x4a0 [ 595.920290] ? may_umount+0xa0/0xa0 [ 595.923895] ? _raw_read_unlock+0x22/0x30 [ 595.928024] ? __get_fs_type+0x8a/0xc0 [ 595.931897] do_mount+0xea4/0x2bb0 [ 595.935423] ? copy_mount_string+0x40/0x40 [ 595.939634] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 595.944630] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 595.949370] ? retint_kernel+0x10/0x10 [ 595.953247] ? copy_mount_options+0x160/0x2e0 [ 595.957717] ? copy_mount_options+0x1f7/0x2e0 [ 595.962194] SyS_mount+0xab/0x120 [ 595.965625] ? copy_mnt_ns+0xb30/0xb30 [ 595.969491] do_syscall_64+0x281/0x940 [ 595.973355] ? __do_page_fault+0xc90/0xc90 [ 595.977565] ? _raw_spin_unlock_irq+0x27/0x70 [ 595.982038] ? finish_task_switch+0x1c1/0x7e0 [ 595.986512] ? syscall_return_slowpath+0x550/0x550 [ 595.991427] ? syscall_return_slowpath+0x2ac/0x550 [ 595.996333] ? prepare_exit_to_usermode+0x350/0x350 [ 596.001326] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 596.006671] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 596.011496] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 596.016662] RIP: 0033:0x4548b9 [ 596.019828] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 596.027511] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 2018/03/29 10:49:45 executing program 4 (fault-call:12 fault-nth:31): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 596.034759] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 596.042002] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 596.049251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 596.056496] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e [ 596.093855] FAULT_INJECTION: forcing a failure. [ 596.093855] name failslab, interval 1, probability 0, space 0, times 0 [ 596.105115] CPU: 0 PID: 26349 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 596.112375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 596.121714] Call Trace: [ 596.124291] dump_stack+0x194/0x24d [ 596.127900] ? arch_local_irq_restore+0x53/0x53 [ 596.132544] ? __save_stack_trace+0x7e/0xd0 [ 596.136855] should_fail+0x8c0/0xa40 [ 596.140550] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 596.145632] ? kasan_kmalloc+0xad/0xe0 [ 596.149492] ? kmem_cache_alloc_trace+0x136/0x740 [ 596.154313] ? __memcg_init_list_lru_node+0x169/0x270 [ 596.159474] ? __list_lru_init+0x544/0x750 [ 596.163684] ? sget_userns+0x6b1/0xe40 [ 596.167548] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 596.172279] ? do_mount+0xea4/0x2bb0 [ 596.175971] ? SyS_mount+0xab/0x120 [ 596.179572] ? do_syscall_64+0x281/0x940 [ 596.183608] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 596.189056] ? find_held_lock+0x35/0x1d0 [ 596.193104] ? __lock_is_held+0xb6/0x140 [ 596.197157] ? check_same_owner+0x320/0x320 [ 596.201460] ? rcu_note_context_switch+0x710/0x710 [ 596.206376] should_failslab+0xec/0x120 [ 596.210325] kmem_cache_alloc_trace+0x4b/0x740 [ 596.214882] ? __kmalloc_node+0x33/0x70 [ 596.218830] ? __kmalloc_node+0x33/0x70 [ 596.222782] ? rcu_read_lock_sched_held+0x108/0x120 [ 596.227782] __memcg_init_list_lru_node+0x169/0x270 [ 596.232778] ? list_lru_add+0x7c0/0x7c0 [ 596.236736] ? __kmalloc_node+0x47/0x70 [ 596.240694] __list_lru_init+0x544/0x750 [ 596.244737] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 596.250599] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 596.255600] ? lockdep_init_map+0x9/0x10 [ 596.259640] sget_userns+0x6b1/0xe40 [ 596.263329] ? set_anon_super+0x20/0x20 [ 596.267286] ? put_filp+0x90/0x90 [ 596.270717] ? destroy_unused_super.part.6+0xd0/0xd0 [ 596.275801] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 596.280797] ? trace_hardirqs_off+0x10/0x10 [ 596.285096] ? putname+0xee/0x130 [ 596.288530] ? cap_capable+0x1b5/0x230 [ 596.292401] ? security_capable+0x8e/0xc0 [ 596.296530] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 596.301693] ? ns_capable_common+0xcf/0x160 [ 596.305994] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 596.311159] mount_ns+0x6d/0x190 [ 596.314504] rpc_mount+0x9e/0xd0 [ 596.317855] mount_fs+0x66/0x2d0 [ 596.321205] vfs_kern_mount.part.26+0xc6/0x4a0 [ 596.325765] ? may_umount+0xa0/0xa0 [ 596.329368] ? _raw_read_unlock+0x22/0x30 [ 596.333491] ? __get_fs_type+0x8a/0xc0 [ 596.337361] do_mount+0xea4/0x2bb0 [ 596.340888] ? copy_mount_string+0x40/0x40 [ 596.345102] ? rcu_pm_notify+0xc0/0xc0 [ 596.348976] ? copy_mount_options+0x5f/0x2e0 [ 596.353359] ? rcu_read_lock_sched_held+0x108/0x120 [ 596.358349] ? kmem_cache_alloc_trace+0x459/0x740 [ 596.363173] ? kasan_check_write+0x14/0x20 [ 596.367383] ? _copy_from_user+0x99/0x110 [ 596.371511] ? copy_mount_options+0x1f7/0x2e0 [ 596.375987] SyS_mount+0xab/0x120 [ 596.379415] ? copy_mnt_ns+0xb30/0xb30 [ 596.383283] do_syscall_64+0x281/0x940 [ 596.387150] ? __do_page_fault+0xc90/0xc90 [ 596.391359] ? _raw_spin_unlock_irq+0x27/0x70 [ 596.395832] ? finish_task_switch+0x1c1/0x7e0 [ 596.400303] ? syscall_return_slowpath+0x550/0x550 [ 596.405207] ? syscall_return_slowpath+0x2ac/0x550 [ 596.410116] ? prepare_exit_to_usermode+0x350/0x350 [ 596.415107] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 596.420450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 596.425277] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 596.430442] RIP: 0033:0x4548b9 [ 596.433604] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 10:49:46 executing program 4 (fault-call:12 fault-nth:32): mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000540)={0x1, 0x0, [0x0]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 596.441287] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 596.448530] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 596.455777] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 596.463026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 596.470277] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001f [ 596.622230] FAULT_INJECTION: forcing a failure. [ 596.622230] name failslab, interval 1, probability 0, space 0, times 0 [ 596.633670] CPU: 0 PID: 26352 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 596.641111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 596.650448] Call Trace: [ 596.653036] dump_stack+0x194/0x24d [ 596.656660] ? arch_local_irq_restore+0x53/0x53 [ 596.661323] ? find_held_lock+0x35/0x1d0 [ 596.665386] should_fail+0x8c0/0xa40 [ 596.669084] ? __list_lru_init+0x352/0x750 [ 596.673314] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 596.678409] ? find_first_zero_bit+0x93/0xe0 [ 596.682813] ? trace_hardirqs_off+0x10/0x10 [ 596.687130] ? find_held_lock+0x35/0x1d0 [ 596.691190] ? __lock_is_held+0xb6/0x140 [ 596.695259] ? check_same_owner+0x320/0x320 [ 596.699564] ? lock_downgrade+0x980/0x980 [ 596.703702] ? rcu_note_context_switch+0x710/0x710 [ 596.708706] ? find_held_lock+0x35/0x1d0 [ 596.712765] should_failslab+0xec/0x120 [ 596.716728] __kmalloc+0x63/0x760 [ 596.720167] ? lock_downgrade+0x980/0x980 [ 596.724307] ? register_shrinker+0x10e/0x2d0 [ 596.728701] ? trace_event_raw_event_module_request+0x320/0x320 [ 596.734755] register_shrinker+0x10e/0x2d0 [ 596.738982] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 596.744769] ? memcpy+0x45/0x50 [ 596.748050] sget_userns+0xbbf/0xe40 [ 596.751750] ? set_anon_super+0x20/0x20 [ 596.755721] ? put_filp+0x90/0x90 [ 596.759166] ? destroy_unused_super.part.6+0xd0/0xd0 [ 596.764263] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 596.769277] ? trace_hardirqs_off+0x10/0x10 [ 596.773590] ? putname+0xee/0x130 [ 596.777039] ? cap_capable+0x1b5/0x230 [ 596.780925] ? security_capable+0x8e/0xc0 [ 596.785064] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 596.790241] ? ns_capable_common+0xcf/0x160 [ 596.794557] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 596.799730] mount_ns+0x6d/0x190 [ 596.803091] rpc_mount+0x9e/0xd0 [ 596.806451] mount_fs+0x66/0x2d0 [ 596.809816] vfs_kern_mount.part.26+0xc6/0x4a0 [ 596.814390] ? may_umount+0xa0/0xa0 [ 596.818004] ? _raw_read_unlock+0x22/0x30 [ 596.822146] ? __get_fs_type+0x8a/0xc0 [ 596.826036] do_mount+0xea4/0x2bb0 [ 596.829581] ? copy_mount_string+0x40/0x40 [ 596.833802] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 596.838809] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 596.843564] ? retint_kernel+0x10/0x10 [ 596.847454] ? copy_mount_options+0x149/0x2e0 [ 596.851939] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 596.856780] ? copy_mount_options+0x1f7/0x2e0 [ 596.861283] SyS_mount+0xab/0x120 [ 596.864725] ? copy_mnt_ns+0xb30/0xb30 [ 596.868604] do_syscall_64+0x281/0x940 [ 596.872476] ? __do_page_fault+0xc90/0xc90 [ 596.876702] ? _raw_spin_unlock_irq+0x27/0x70 [ 596.881188] ? finish_task_switch+0x1c1/0x7e0 [ 596.885677] ? syscall_return_slowpath+0x550/0x550 [ 596.890604] ? syscall_return_slowpath+0x2ac/0x550 [ 596.895522] ? prepare_exit_to_usermode+0x350/0x350 [ 596.900529] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 596.905888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 596.910730] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 596.915904] RIP: 0033:0x4548b9 [ 596.919076] RSP: 002b:00007f5fe5c5bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 596.926772] RAX: ffffffffffffffda RBX: 00007f5fe5c5c6d4 RCX: 00000000004548b9 [ 596.934026] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 596.941281] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 596.948537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 596.955799] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000020 [ 596.994309] ------------[ cut here ]------------ [ 596.999137] refcount_t: increment on 0; use-after-free. [ 597.004627] WARNING: CPU: 0 PID: 25364 at lib/refcount.c:153 refcount_inc+0x47/0x50 [ 597.012403] Kernel panic - not syncing: panic_on_warn set ... [ 597.012403] [ 597.019749] CPU: 0 PID: 25364 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #40 [ 597.027006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.036343] Call Trace: [ 597.038923] dump_stack+0x194/0x24d [ 597.042541] ? arch_local_irq_restore+0x53/0x53 [ 597.047205] ? vsnprintf+0x1ed/0x1900 [ 597.051003] panic+0x1e4/0x41c [ 597.054185] ? refcount_error_report+0x214/0x214 [ 597.058925] ? show_regs_print_info+0x18/0x18 [ 597.063426] ? __warn+0x1c1/0x200 [ 597.066871] ? refcount_inc+0x47/0x50 [ 597.070656] __warn+0x1dc/0x200 [ 597.073923] ? refcount_inc+0x47/0x50 [ 597.077715] report_bug+0x1f4/0x2b0 [ 597.081340] fixup_bug.part.11+0x37/0x80 [ 597.085390] do_error_trap+0x2d7/0x3e0 [ 597.089266] ? vprintk_default+0x28/0x30 [ 597.093317] ? math_error+0x400/0x400 [ 597.097105] ? printk+0xaa/0xca [ 597.100374] ? show_regs_print_info+0x18/0x18 [ 597.104872] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 597.109712] do_invalid_op+0x1b/0x20 [ 597.113412] invalid_op+0x1b/0x40 [ 597.116851] RIP: 0010:refcount_inc+0x47/0x50 [ 597.121242] RSP: 0018:ffff8801b6d87860 EFLAGS: 00010286 [ 597.126592] RAX: dffffc0000000008 RBX: ffff8801a9a6c304 RCX: ffffffff815ba4be [ 597.133849] RDX: 0000000000000000 RSI: 1ffff10036db0ebc RDI: 1ffff10036db0e91 [ 597.141242] RBP: ffff8801b6d87868 R08: 0000000000000000 R09: 0000000000000000 [ 597.148495] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801b6d87af8 [ 597.156455] R13: ffff8801b102b513 R14: ffff8801a9a6c300 R15: ffff8801b102b501 [ 597.163733] ? vprintk_func+0x5e/0xc0 [ 597.167534] sk_alloc+0x3f9/0x1440 [ 597.171070] ? sock_def_error_report+0x5e0/0x5e0 [ 597.175808] ? __raw_spin_lock_init+0x2d/0x100 [ 597.180383] ? trace_hardirqs_off+0x10/0x10 [ 597.184689] ? do_raw_write_unlock+0x290/0x290 [ 597.189272] ? trace_hardirqs_off+0x10/0x10 [ 597.193582] ? __raw_spin_lock_init+0x1c/0x100 [ 597.198161] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 597.203176] ? find_held_lock+0x35/0x1d0 [ 597.207240] ? inet_create+0x3fc/0xf50 [ 597.211117] ? lock_downgrade+0x980/0x980 [ 597.215259] ? lock_release+0xa40/0xa40 [ 597.219217] ? lock_downgrade+0x980/0x980 [ 597.223381] inet_create+0x47c/0xf50 [ 597.227092] ? ipip_gro_receive+0xf0/0xf0 [ 597.231232] ? __lock_is_held+0xb6/0x140 [ 597.235301] __sock_create+0x4d4/0x850 [ 597.239184] ? kernel_sock_ip_overhead+0x4c0/0x4c0 [ 597.244112] ? user_path_create+0x40/0x40 [ 597.248263] SyS_socket+0xeb/0x1d0 [ 597.251796] ? fillonedir+0x250/0x250 [ 597.255588] ? move_addr_to_kernel+0x60/0x60 [ 597.259976] ? getname_flags+0x256/0x580 [ 597.264016] ? do_syscall_64+0xb7/0x940 [ 597.267976] ? move_addr_to_kernel+0x60/0x60 [ 597.272359] do_syscall_64+0x281/0x940 [ 597.276219] ? __do_page_fault+0xc90/0xc90 [ 597.280427] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 597.285939] ? syscall_return_slowpath+0x550/0x550 [ 597.290843] ? syscall_return_slowpath+0x2ac/0x550 [ 597.295752] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 597.301093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 597.305914] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 597.311085] RIP: 0033:0x4573e7 [ 597.314245] RSP: 002b:00007ffec326ca98 EFLAGS: 00000206 ORIG_RAX: 0000000000000029 [ 597.321927] RAX: ffffffffffffffda RBX: 00000000000000a1 RCX: 00000000004573e7 [ 597.329171] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 597.336414] RBP: 00007ffec326d140 R08: 0000000000000000 R09: 0000000000000001 [ 597.343657] R10: 0000000000000006 R11: 0000000000000206 R12: 0000000000000152 [ 597.350912] R13: 0000000000000152 R14: 000000000000000e R15: 0000000000091a83 [ 597.358744] Dumping ftrace buffer: [ 597.362331] (ftrace buffer empty) [ 597.366014] Kernel Offset: disabled [ 597.369615] Rebooting in 86400 seconds..