4.16.0-rc7+ #7 [ 1116.563300] xprt_adjust_timeout: rq_timeout = 0! [ 1116.566154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.566161] Call Trace: [ 1116.566182] dump_stack+0x194/0x24d [ 1116.566203] ? arch_local_irq_restore+0x53/0x53 [ 1116.566238] should_fail+0x8c0/0xa40 [ 1116.566258] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1116.566275] ? memset+0x31/0x40 [ 1116.566294] ? perf_trace_lock+0x4d6/0x900 [ 1116.607419] ? perf_trace_lock+0x4d6/0x900 [ 1116.611640] ? find_held_lock+0x35/0x1d0 [ 1116.615693] ? __lock_is_held+0xb6/0x140 [ 1116.619749] ? check_same_owner+0x320/0x320 [ 1116.624056] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1116.629066] ? rcu_note_context_switch+0x710/0x710 [ 1116.633993] should_failslab+0xec/0x120 [ 1116.637953] kmem_cache_alloc+0x47/0x760 [ 1116.641996] ? current_time+0x18/0xc0 [ 1116.645785] ? lock_downgrade+0x980/0x980 [ 1116.649918] __d_alloc+0xc1/0xbd0 [ 1116.653350] ? lock_release+0xa40/0xa40 [ 1116.657307] ? shrink_dcache_for_umount+0x290/0x290 [ 1116.662303] ? mark_held_locks+0xaf/0x100 [ 1116.666433] ? current_kernel_time64+0x122/0x2f0 [ 1116.671171] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1116.676168] ? trace_hardirqs_on+0xd/0x10 [ 1116.680295] ? current_kernel_time64+0x1d4/0x2f0 [ 1116.685044] ? ktime_get_raw+0x380/0x380 [ 1116.689085] ? evict_inodes+0x580/0x580 [ 1116.693045] ? timespec_trunc+0x79/0xe0 [ 1116.697509] ? inc_nlink+0x45/0x140 [ 1116.701124] d_make_root+0x3f/0x80 [ 1116.704648] rpc_fill_super+0x32f/0xae0 [ 1116.708606] ? cap_capable+0x1b5/0x230 [ 1116.712474] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1116.717650] ? security_capable+0x8e/0xc0 [ 1116.721784] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1116.726957] ? ns_capable_common+0xcf/0x160 [ 1116.731266] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1116.736435] mount_ns+0xc4/0x190 [ 1116.739787] rpc_mount+0x9e/0xd0 [ 1116.743138] mount_fs+0x66/0x2d0 [ 1116.746493] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1116.751061] ? may_umount+0xa0/0xa0 [ 1116.754674] ? _raw_read_unlock+0x22/0x30 [ 1116.758800] ? __get_fs_type+0x8a/0xc0 [ 1116.762674] do_mount+0xea4/0x2bb0 [ 1116.766203] ? copy_mount_string+0x40/0x40 [ 1116.770441] ? rcu_pm_notify+0xc0/0xc0 [ 1116.774321] ? copy_mount_options+0x5f/0x2e0 [ 1116.778709] ? rcu_read_lock_sched_held+0x108/0x120 [ 1116.783706] ? kmem_cache_alloc_trace+0x459/0x740 [ 1116.788534] ? kasan_check_write+0x14/0x20 [ 1116.792751] ? _copy_from_user+0x99/0x110 [ 1116.796885] ? copy_mount_options+0x1f7/0x2e0 [ 1116.801370] SyS_mount+0xab/0x120 [ 1116.804804] ? copy_mnt_ns+0xb30/0xb30 [ 1116.808678] do_syscall_64+0x281/0x940 [ 1116.812546] ? vmalloc_sync_all+0x30/0x30 [ 1116.816673] ? _raw_spin_unlock_irq+0x27/0x70 [ 1116.821150] ? finish_task_switch+0x1c1/0x7e0 [ 1116.825627] ? syscall_return_slowpath+0x550/0x550 [ 1116.830540] ? syscall_return_slowpath+0x2ac/0x550 [ 1116.835450] ? prepare_exit_to_usermode+0x350/0x350 [ 1116.840449] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1116.845797] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1116.850628] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1116.855796] RIP: 0033:0x454e79 [ 1116.858969] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1116.866659] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1116.873909] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1116.881158] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1116.888409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1116.895659] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003a [ 1116.968438] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:20:54 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443ea999a6db33e4de4c5af50ebf91525906") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:20:54 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x11, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:54 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000c40)=""/148, 0x94}], 0x6) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:20:54 executing program 6: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x800) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc7301a422cfe2", 0x2d, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}], 0x2c) 2018/03/30 22:20:54 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cb") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:54 executing program 4 (fault-call:13 fault-nth:59): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:20:54 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) stat(&(0x7f0000000880)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_mount(&(0x7f0000000400)='./file0\x00', 0xc000, r11, r12, 0x3, 0x40002) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:54 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1117.092422] xprt_adjust_timeout: rq_timeout = 0! [ 1117.098559] xprt_adjust_timeout: rq_timeout = 0! [ 1117.105171] xprt_adjust_timeout: rq_timeout = 0! [ 1117.124587] FAULT_INJECTION: forcing a failure. [ 1117.124587] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.135945] CPU: 0 PID: 22076 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1117.143139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1117.152494] Call Trace: [ 1117.155090] dump_stack+0x194/0x24d [ 1117.158734] ? arch_local_irq_restore+0x53/0x53 [ 1117.163430] should_fail+0x8c0/0xa40 [ 1117.167160] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1117.172269] ? perf_tp_event+0xae0/0xae0 [ 1117.176356] ? memset+0x31/0x40 [ 1117.179650] ? find_held_lock+0x35/0x1d0 [ 1117.183733] ? __lock_is_held+0xb6/0x140 [ 1117.187824] ? check_same_owner+0x320/0x320 [ 1117.192151] ? trace_hardirqs_off+0x10/0x10 [ 1117.196484] ? rcu_note_context_switch+0x710/0x710 [ 1117.201417] ? register_shrinker+0x10e/0x2d0 [ 1117.205845] should_failslab+0xec/0x120 [ 1117.209832] kmem_cache_alloc+0x47/0x760 [ 1117.210694] xprt_adjust_timeout: rq_timeout = 0! [ 1117.213893] ? find_held_lock+0x35/0x1d0 [ 1117.213917] ? rpc_i_callback+0x30/0x30 [ 1117.213940] rpc_alloc_inode+0x1a/0x20 [ 1117.213954] alloc_inode+0x65/0x180 [ 1117.213969] new_inode_pseudo+0x69/0x190 [ 1117.213982] ? prune_icache_sb+0x1a0/0x1a0 [ 1117.242493] ? __lock_is_held+0xb6/0x140 [ 1117.246572] new_inode+0x1c/0x40 [ 1117.249956] rpc_get_inode+0x20/0x1e0 [ 1117.253765] rpc_fill_super+0x327/0xae0 [ 1117.257746] ? cap_capable+0x1b5/0x230 [ 1117.261636] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1117.266835] ? security_capable+0x8e/0xc0 [ 1117.270992] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1117.275865] xprt_adjust_timeout: rq_timeout = 0! [ 1117.276179] ? ns_capable_common+0xcf/0x160 [ 1117.276198] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 2018/03/30 22:20:54 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cb") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:54 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x11, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1117.276210] mount_ns+0xc4/0x190 [ 1117.293791] rpc_mount+0x9e/0xd0 [ 1117.297179] mount_fs+0x66/0x2d0 [ 1117.300557] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1117.305147] ? may_umount+0xa0/0xa0 [ 1117.308782] ? _raw_read_unlock+0x22/0x30 [ 1117.312944] ? __get_fs_type+0x8a/0xc0 [ 1117.316846] do_mount+0xea4/0x2bb0 [ 1117.320405] ? copy_mount_string+0x40/0x40 [ 1117.324643] ? rcu_pm_notify+0xc0/0xc0 [ 1117.328543] ? copy_mount_options+0x5f/0x2e0 [ 1117.332961] ? rcu_read_lock_sched_held+0x108/0x120 [ 1117.335557] xprt_adjust_timeout: rq_timeout = 0! [ 1117.337975] ? kmem_cache_alloc_trace+0x459/0x740 [ 1117.337993] ? kasan_check_write+0x14/0x20 [ 1117.338016] ? copy_mount_options+0x1f7/0x2e0 [ 1117.338036] SyS_mount+0xab/0x120 [ 1117.338047] ? copy_mnt_ns+0xb30/0xb30 [ 1117.338065] do_syscall_64+0x281/0x940 [ 1117.338077] ? vmalloc_sync_all+0x30/0x30 [ 1117.338088] ? _raw_spin_unlock_irq+0x27/0x70 [ 1117.338100] ? finish_task_switch+0x1c1/0x7e0 [ 1117.380557] ? syscall_return_slowpath+0x550/0x550 [ 1117.385468] ? syscall_return_slowpath+0x2ac/0x550 [ 1117.390377] ? prepare_exit_to_usermode+0x350/0x350 [ 1117.395378] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1117.400725] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1117.405554] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1117.410723] RIP: 0033:0x454e79 [ 1117.413893] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1117.421587] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1117.428837] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1117.436088] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1117.443335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1117.450586] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003b [ 1117.476142] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1117.493745] REISERFS (device loop7): using ordered data mode [ 1117.499732] reiserfs: using flush barriers [ 1117.520464] xprt_adjust_timeout: rq_timeout = 0! [ 1117.526222] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1117.536085] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space 2018/03/30 22:20:55 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cb") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:55 executing program 4 (fault-call:13 fault-nth:60): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:20:55 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:55 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:55 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) r11 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000880)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r12 = add_key(&(0x7f00000008c0)='.request_key_auth\x00', &(0x7f0000000940)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000980)="0746f7b43bb72295e311ec5dacae4df00f0dd49be9c1882064c6f2ac917decacf70df0c29695b5490791c2256707e9ea8c4101cde921eb9e4d717c78d1f05d150c6605597e0e9a100d57698b3bc2583ee01eacd733d2d8d94f17d8acaff08fa9b675ab420e95d2a1ece80575284618bdb754d1d14a9d021508d6be22713f3a8552b0cc1c7547b5d06238f644800203cecd37", 0x92, 0xfffffffffffffffb) keyctl$negate(0xd, r11, 0x1, r12) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000080000000000000000000000850000001b00000000000000000000008500000012000000000000000000000faf80000000000000000000000000000018000000030000000000000000000000bf01feff080000000000000000000000d0f7fffffcffffff0000000000000000637f5e00ffffffff0000000000000000181a0000", @ANYRES32=r8, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:55 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000c40)=""/148, 0x94}], 0x6) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:20:55 executing program 6: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x800) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc7301a422cfe2", 0x2d, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}], 0x2c) 2018/03/30 22:20:55 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443ea999a6db33e4de4c5af50ebf91525906") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) [ 1118.042847] xprt_adjust_timeout: rq_timeout = 0! [ 1118.043430] xprt_adjust_timeout: rq_timeout = 0! [ 1118.054928] xprt_adjust_timeout: rq_timeout = 0! [ 1118.068383] xprt_adjust_timeout: rq_timeout = 0! [ 1118.090460] FAULT_INJECTION: forcing a failure. [ 1118.090460] name failslab, interval 1, probability 0, space 0, times 0 [ 1118.102062] CPU: 0 PID: 22127 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1118.109254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1118.118604] Call Trace: [ 1118.121188] dump_stack+0x194/0x24d [ 1118.124804] ? arch_local_irq_restore+0x53/0x53 [ 1118.129471] should_fail+0x8c0/0xa40 [ 1118.133170] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1118.138258] ? trace_event_raw_event_lock+0x340/0x340 [ 1118.143444] ? find_held_lock+0x35/0x1d0 [ 1118.147494] ? __lock_is_held+0xb6/0x140 [ 1118.151552] ? check_same_owner+0x320/0x320 [ 1118.155853] ? d_alloc+0x269/0x340 [ 1118.159390] ? rcu_note_context_switch+0x710/0x710 [ 1118.164312] should_failslab+0xec/0x120 [ 1118.168271] kmem_cache_alloc+0x47/0x760 [ 1118.172318] ? d_drop+0x51/0x60 [ 1118.175585] ? rpc_i_callback+0x30/0x30 [ 1118.179544] rpc_alloc_inode+0x1a/0x20 [ 1118.183416] alloc_inode+0x65/0x180 [ 1118.187034] new_inode_pseudo+0x69/0x190 [ 1118.191079] ? prune_icache_sb+0x1a0/0x1a0 [ 1118.195297] ? do_raw_spin_trylock+0x190/0x190 [ 1118.199863] ? d_add+0xa70/0xa70 [ 1118.203215] new_inode+0x1c/0x40 [ 1118.206562] rpc_get_inode+0x20/0x1e0 [ 1118.210346] __rpc_create_common+0x5d/0x1d0 [ 1118.214657] rpc_populate.constprop.15+0x1ad/0x340 [ 1118.219577] rpc_fill_super+0x379/0xae0 [ 1118.223539] ? cap_capable+0x1b5/0x230 [ 1118.227410] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1118.232584] ? security_capable+0x8e/0xc0 [ 1118.236717] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1118.241889] ? ns_capable_common+0xcf/0x160 [ 1118.246194] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1118.251364] mount_ns+0xc4/0x190 [ 1118.254715] rpc_mount+0x9e/0xd0 [ 1118.258064] mount_fs+0x66/0x2d0 [ 1118.261415] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1118.265979] ? may_umount+0xa0/0xa0 [ 1118.269586] ? _raw_read_unlock+0x22/0x30 [ 1118.273716] ? __get_fs_type+0x8a/0xc0 [ 1118.277589] do_mount+0xea4/0x2bb0 [ 1118.281120] ? copy_mount_string+0x40/0x40 [ 1118.285335] ? rcu_pm_notify+0xc0/0xc0 [ 1118.289211] ? copy_mount_options+0x5f/0x2e0 [ 1118.293599] ? rcu_read_lock_sched_held+0x108/0x120 [ 1118.298596] ? kmem_cache_alloc_trace+0x459/0x740 [ 1118.303421] ? kasan_check_write+0x14/0x20 [ 1118.307635] ? _copy_from_user+0x99/0x110 [ 1118.311769] ? copy_mount_options+0x1f7/0x2e0 [ 1118.316250] SyS_mount+0xab/0x120 [ 1118.319682] ? copy_mnt_ns+0xb30/0xb30 [ 1118.323552] do_syscall_64+0x281/0x940 [ 1118.327422] ? vmalloc_sync_all+0x30/0x30 [ 1118.331549] ? _raw_spin_unlock_irq+0x27/0x70 [ 1118.336034] ? finish_task_switch+0x1c1/0x7e0 [ 1118.340512] ? syscall_return_slowpath+0x550/0x550 [ 1118.345423] ? syscall_return_slowpath+0x2ac/0x550 [ 1118.350334] ? prepare_exit_to_usermode+0x350/0x350 [ 1118.355331] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1118.360680] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1118.365511] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1118.370680] RIP: 0033:0x454e79 [ 1118.373855] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1118.381546] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1118.388796] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1118.396047] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1118.403296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1118.410544] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003c [ 1118.417926] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry lockd [ 1118.431726] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 1118.448241] xprt_adjust_timeout: rq_timeout = 0! [ 1118.457516] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1118.472232] REISERFS (device loop7): using ordered data mode [ 1118.478177] reiserfs: using flush barriers [ 1118.485148] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header 2018/03/30 22:20:55 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:55 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff291340") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1118.495067] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space 2018/03/30 22:20:55 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:55 executing program 4 (fault-call:13 fault-nth:61): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1118.554728] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:20:55 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) fcntl$setflags(r3, 0x2, 0x1) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r6, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000540)={r6}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r6}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r4, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r10, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r10, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r7) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r11}, 0xffffffffffffff03) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000080000000000000000000000850000001b000000000000000000000085000000120000000000000000000000ff06ffff7c250000000000000000000018000000030000000000000000000000bf01feff080000000000000000000000d0f7fffffcffffff0000000000000000637f5e00ffffffff0000000000000000181a0000", @ANYRES32=r9, @ANYBLOB="0000008cc800f300000a090000000000022b65f259dd192fb2e3933329c0db5f13f834e28146444fafce623f2e04a33233facb7d4915ed"], &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:55 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443ea999a6db33e4de4c5af50ebf91525906") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) [ 1118.613105] xprt_adjust_timeout: rq_timeout = 0! [ 1118.642781] xprt_adjust_timeout: rq_timeout = 0! [ 1118.676933] FAULT_INJECTION: forcing a failure. [ 1118.676933] name failslab, interval 1, probability 0, space 0, times 0 [ 1118.688269] CPU: 1 PID: 22160 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1118.695458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1118.697042] xprt_adjust_timeout: rq_timeout = 0! [ 1118.704803] Call Trace: [ 1118.704833] dump_stack+0x194/0x24d [ 1118.704850] ? arch_local_irq_restore+0x53/0x53 [ 1118.704875] should_fail+0x8c0/0xa40 [ 1118.704885] ? unwind_dump+0x4d0/0x4d0 [ 1118.704903] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1118.730209] xprt_adjust_timeout: rq_timeout = 0! [ 1118.733144] ? perf_trace_lock+0x900/0x900 [ 1118.733164] ? __lock_acquire+0x664/0x3e00 [ 1118.733181] ? find_held_lock+0x35/0x1d0 [ 1118.733197] ? __lock_is_held+0xb6/0x140 [ 1118.733217] ? check_same_owner+0x320/0x320 [ 1118.758776] ? __d_lookup+0x4f4/0x830 [ 1118.762580] ? rcu_note_context_switch+0x710/0x710 [ 1118.766883] xprt_adjust_timeout: rq_timeout = 0! [ 1118.767508] should_failslab+0xec/0x120 [ 1118.767520] kmem_cache_alloc+0x47/0x760 [ 1118.767539] __d_alloc+0xc1/0xbd0 [ 1118.767551] ? shrink_dcache_for_umount+0x290/0x290 [ 1118.788707] ? d_alloc_parallel+0x1b40/0x1b40 [ 1118.793202] ? lock_release+0xa40/0xa40 [ 1118.797180] ? mark_held_locks+0xaf/0x100 [ 1118.801316] ? d_lookup+0x133/0x2e0 [ 1118.804940] ? d_lookup+0x1d5/0x2e0 [ 1118.808566] d_alloc+0x8e/0x340 [ 1118.811840] ? __d_alloc+0xbd0/0xbd0 [ 1118.815549] ? full_name_hash+0x9b/0xe0 [ 1118.819523] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1118.824797] ? down_write+0x87/0x120 [ 1118.828509] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1118.832734] ? down_read+0x150/0x150 [ 1118.836428] ? evict_inodes+0x580/0x580 [ 1118.840386] rpc_populate.constprop.15+0xa3/0x340 [ 1118.845215] rpc_fill_super+0x379/0xae0 [ 1118.849170] ? cap_capable+0x1b5/0x230 [ 1118.853038] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1118.858207] ? security_capable+0x8e/0xc0 [ 1118.862335] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1118.867503] ? ns_capable_common+0xcf/0x160 [ 1118.871891] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1118.877057] mount_ns+0xc4/0x190 [ 1118.880409] rpc_mount+0x9e/0xd0 [ 1118.883756] mount_fs+0x66/0x2d0 [ 1118.887102] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1118.891663] ? may_umount+0xa0/0xa0 [ 1118.895267] ? _raw_read_unlock+0x22/0x30 [ 1118.899394] ? __get_fs_type+0x8a/0xc0 [ 1118.903258] do_mount+0xea4/0x2bb0 [ 1118.906778] ? copy_mount_string+0x40/0x40 [ 1118.910989] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1118.915984] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1118.920721] ? retint_kernel+0x10/0x10 [ 1118.924587] ? copy_mount_options+0x18b/0x2e0 [ 1118.929058] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1118.933879] ? copy_mount_options+0x1f7/0x2e0 [ 1118.938355] SyS_mount+0xab/0x120 [ 1118.941783] ? copy_mnt_ns+0xb30/0xb30 [ 1118.945648] do_syscall_64+0x281/0x940 [ 1118.949512] ? vmalloc_sync_all+0x30/0x30 [ 1118.953637] ? _raw_spin_unlock_irq+0x27/0x70 [ 1118.958109] ? finish_task_switch+0x1c1/0x7e0 [ 1118.962583] ? syscall_return_slowpath+0x550/0x550 [ 1118.967489] ? syscall_return_slowpath+0x2ac/0x550 [ 1118.972397] ? prepare_exit_to_usermode+0x350/0x350 [ 1118.977390] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1118.982731] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1118.987553] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1118.992718] RIP: 0033:0x454e79 [ 1118.995884] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1119.003569] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1119.010813] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1119.018059] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/03/30 22:20:55 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1119.025306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1119.032549] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003d [ 1119.040062] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 1119.123858] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1119.137600] REISERFS (device loop7): using ordered data mode [ 1119.143515] reiserfs: using flush barriers [ 1119.151923] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1119.161631] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space 2018/03/30 22:20:56 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:56 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff291340") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:56 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x1000001, 0x7, 0x174f1f0c, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) shutdown(r6, 0x1) sendto$llc(r3, &(0x7f0000000400)="fd20eff2f255b979a007d02e0b44", 0xe, 0x10, &(0x7f0000000880)={0x1a, 0x327, 0x92a, 0x7, 0x8001, 0x20, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x10) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r4, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:56 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000c40)=""/148, 0x94}], 0x6) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:20:56 executing program 4 (fault-call:13 fault-nth:62): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:20:56 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:56 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x0) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443ea999a6db33e4de4c5af50ebf91525906") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:20:56 executing program 6: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x800) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc7301a422cfe2", 0x2d, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}], 0x2c) [ 1119.267170] xprt_adjust_timeout: rq_timeout = 0! [ 1119.267466] xprt_adjust_timeout: rq_timeout = 0! [ 1119.277431] xprt_adjust_timeout: rq_timeout = 0! [ 1119.280090] xprt_adjust_timeout: rq_timeout = 0! [ 1119.302975] FAULT_INJECTION: forcing a failure. [ 1119.302975] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.314377] CPU: 0 PID: 22204 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1119.321573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1119.330930] Call Trace: [ 1119.333536] dump_stack+0x194/0x24d [ 1119.337165] ? arch_local_irq_restore+0x53/0x53 [ 1119.341836] should_fail+0x8c0/0xa40 [ 1119.345547] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1119.350640] ? trace_event_raw_event_lock+0x340/0x340 [ 1119.355831] ? find_held_lock+0x35/0x1d0 [ 1119.359885] ? __lock_is_held+0xb6/0x140 [ 1119.363942] ? check_same_owner+0x320/0x320 [ 1119.368244] ? d_alloc+0x269/0x340 [ 1119.371769] ? rcu_note_context_switch+0x710/0x710 [ 1119.376695] should_failslab+0xec/0x120 [ 1119.380652] kmem_cache_alloc+0x47/0x760 [ 1119.384698] ? d_drop+0x51/0x60 [ 1119.387961] ? rpc_i_callback+0x30/0x30 [ 1119.391920] rpc_alloc_inode+0x1a/0x20 [ 1119.395791] alloc_inode+0x65/0x180 [ 1119.399402] new_inode_pseudo+0x69/0x190 [ 1119.403443] ? prune_icache_sb+0x1a0/0x1a0 [ 1119.407658] ? do_raw_spin_trylock+0x190/0x190 [ 1119.412223] ? d_add+0xa70/0xa70 [ 1119.415577] new_inode+0x1c/0x40 [ 1119.418927] rpc_get_inode+0x20/0x1e0 [ 1119.422710] __rpc_create_common+0x5d/0x1d0 [ 1119.427027] rpc_populate.constprop.15+0x1ad/0x340 [ 1119.431949] rpc_fill_super+0x379/0xae0 [ 1119.435912] ? cap_capable+0x1b5/0x230 [ 1119.439786] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1119.444961] ? security_capable+0x8e/0xc0 [ 1119.449092] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1119.454265] ? ns_capable_common+0xcf/0x160 [ 1119.458571] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1119.463741] mount_ns+0xc4/0x190 [ 1119.467091] rpc_mount+0x9e/0xd0 [ 1119.470445] mount_fs+0x66/0x2d0 [ 1119.473801] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1119.478365] ? may_umount+0xa0/0xa0 [ 1119.481974] ? _raw_read_unlock+0x22/0x30 [ 1119.486107] ? __get_fs_type+0x8a/0xc0 [ 1119.489980] do_mount+0xea4/0x2bb0 [ 1119.493508] ? copy_mount_string+0x40/0x40 [ 1119.497722] ? rcu_pm_notify+0xc0/0xc0 [ 1119.501597] ? copy_mount_options+0x5f/0x2e0 [ 1119.505987] ? rcu_read_lock_sched_held+0x108/0x120 [ 1119.510989] ? kmem_cache_alloc_trace+0x459/0x740 [ 1119.515816] ? kasan_check_write+0x14/0x20 [ 1119.520044] ? copy_mount_options+0x1f7/0x2e0 [ 1119.524524] SyS_mount+0xab/0x120 [ 1119.527958] ? copy_mnt_ns+0xb30/0xb30 [ 1119.531829] do_syscall_64+0x281/0x940 [ 1119.535696] ? vmalloc_sync_all+0x30/0x30 [ 1119.539824] ? _raw_spin_unlock_irq+0x27/0x70 [ 1119.544302] ? finish_task_switch+0x1c1/0x7e0 [ 1119.548782] ? syscall_return_slowpath+0x550/0x550 [ 1119.553693] ? syscall_return_slowpath+0x2ac/0x550 [ 1119.558603] ? prepare_exit_to_usermode+0x350/0x350 [ 1119.563601] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1119.568951] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1119.573788] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1119.578957] RIP: 0033:0x454e79 [ 1119.582129] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1119.589823] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1119.597071] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1119.604321] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1119.611571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 2018/03/30 22:20:56 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff291340") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1119.618821] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003e [ 1119.626260] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry lockd [ 1119.636685] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 1119.658507] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:20:56 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:56 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) getsockopt$bt_hci(r7, 0x0, 0x2, &(0x7f0000000400)=""/59, &(0x7f0000000580)=0x3b) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000080000000000000000000000850000001b000000000000000000000085000000120000000000000000000000ff06ffff7c250000000000000000000018000000030000000000000000000000bf01feff080000000000000000000000d0f7fffffcffffff0000000000000000637f5e00ffffffff0000000000000000181a0000", @ANYRES32=r8, @ANYBLOB="0000b33f34126e29911fee05ec477e3fbc0100000000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:56 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1119.700050] xprt_adjust_timeout: rq_timeout = 0! [ 1119.708652] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1119.729873] REISERFS (device loop7): using ordered data mode [ 1119.735812] reiserfs: using flush barriers 2018/03/30 22:20:56 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2e") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1119.805928] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1119.816153] xprt_adjust_timeout: rq_timeout = 0! [ 1119.822451] xprt_adjust_timeout: rq_timeout = 0! [ 1119.827571] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 1119.842124] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:20:56 executing program 4 (fault-call:13 fault-nth:63): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1119.862702] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:20:57 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:57 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x0, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:57 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x0) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443ea999a6db33e4de4c5af50ebf91525906") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:20:57 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) ioctl$KDGKBENT(r7, 0x4b46, &(0x7f0000000400)={0x4, 0x8000, 0x8000}) [ 1119.933227] xprt_adjust_timeout: rq_timeout = 0! [ 1120.002888] xprt_adjust_timeout: rq_timeout = 0! [ 1120.011370] xprt_adjust_timeout: rq_timeout = 0! [ 1120.020586] FAULT_INJECTION: forcing a failure. [ 1120.020586] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.031906] CPU: 1 PID: 22240 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1120.039089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.048435] Call Trace: 2018/03/30 22:20:57 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2e") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1120.051024] dump_stack+0x194/0x24d [ 1120.054658] ? arch_local_irq_restore+0x53/0x53 [ 1120.059343] should_fail+0x8c0/0xa40 [ 1120.063057] ? perf_trace_lock_acquire+0xe3/0x980 [ 1120.067900] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1120.072999] ? trace_event_raw_event_lock+0x340/0x340 [ 1120.078188] ? perf_trace_lock+0x900/0x900 [ 1120.082421] ? mark_held_locks+0xaf/0x100 [ 1120.086568] ? __raw_spin_lock_init+0x1c/0x100 [ 1120.091153] ? find_held_lock+0x35/0x1d0 [ 1120.095216] ? __lock_is_held+0xb6/0x140 [ 1120.099295] ? check_same_owner+0x320/0x320 [ 1120.103611] ? d_alloc+0x269/0x340 [ 1120.107151] ? rcu_note_context_switch+0x710/0x710 [ 1120.112089] should_failslab+0xec/0x120 [ 1120.113330] xprt_adjust_timeout: rq_timeout = 0! [ 1120.116055] kmem_cache_alloc+0x47/0x760 [ 1120.116072] ? d_drop+0x51/0x60 [ 1120.116085] ? rpc_i_callback+0x30/0x30 [ 1120.116099] rpc_alloc_inode+0x1a/0x20 [ 1120.116109] alloc_inode+0x65/0x180 [ 1120.116120] new_inode_pseudo+0x69/0x190 [ 1120.116131] ? prune_icache_sb+0x1a0/0x1a0 [ 1120.116141] ? do_raw_spin_trylock+0x190/0x190 [ 1120.116152] ? d_add+0xa70/0xa70 [ 1120.116169] new_inode+0x1c/0x40 [ 1120.159171] rpc_get_inode+0x20/0x1e0 [ 1120.162975] __rpc_create_common+0x5d/0x1d0 [ 1120.167302] rpc_populate.constprop.15+0x1ad/0x340 [ 1120.172242] rpc_fill_super+0x379/0xae0 [ 1120.176216] ? cap_capable+0x1b5/0x230 [ 1120.180103] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1120.180355] xprt_adjust_timeout: rq_timeout = 0! [ 1120.185289] ? security_capable+0x8e/0xc0 [ 1120.185304] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1120.185314] ? ns_capable_common+0xcf/0x160 [ 1120.185327] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1120.185337] mount_ns+0xc4/0x190 [ 1120.185352] rpc_mount+0x9e/0xd0 [ 1120.185365] mount_fs+0x66/0x2d0 [ 1120.185381] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1120.185394] ? may_umount+0xa0/0xa0 [ 1120.185406] ? _raw_read_unlock+0x22/0x30 [ 1120.185416] ? __get_fs_type+0x8a/0xc0 [ 1120.185430] do_mount+0xea4/0x2bb0 [ 1120.185445] ? copy_mount_string+0x40/0x40 [ 1120.242805] ? rcu_pm_notify+0xc0/0xc0 [ 1120.246676] ? copy_mount_options+0x5f/0x2e0 [ 1120.251060] ? rcu_read_lock_sched_held+0x108/0x120 [ 1120.256056] ? kmem_cache_alloc_trace+0x459/0x740 [ 1120.260875] ? kasan_check_write+0x14/0x20 [ 1120.265088] ? copy_mount_options+0x1f7/0x2e0 [ 1120.269565] SyS_mount+0xab/0x120 [ 1120.272994] ? copy_mnt_ns+0xb30/0xb30 [ 1120.276865] do_syscall_64+0x281/0x940 [ 1120.280732] ? vmalloc_sync_all+0x30/0x30 [ 1120.284858] ? _raw_spin_unlock_irq+0x27/0x70 [ 1120.289341] ? finish_task_switch+0x1c1/0x7e0 [ 1120.293814] ? syscall_return_slowpath+0x550/0x550 [ 1120.298720] ? syscall_return_slowpath+0x2ac/0x550 [ 1120.303628] ? prepare_exit_to_usermode+0x350/0x350 [ 1120.308623] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1120.313964] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1120.318788] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1120.323953] RIP: 0033:0x454e79 [ 1120.327117] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1120.334804] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1120.342062] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1120.349310] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1120.356555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1120.363802] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003f [ 1120.371232] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry mount [ 1120.382435] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1120.407223] REISERFS (device loop7): using ordered data mode [ 1120.409059] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 1120.413318] reiserfs: using flush barriers [ 1120.458786] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1120.469216] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 1120.494993] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:20:57 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0x0, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:57 executing program 6: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x800) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc7301a422cfe2", 0x2d, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:20:57 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2e") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:57 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}], 0x6) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:20:57 executing program 4 (fault-call:13 fault-nth:64): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:20:57 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:57 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r6, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000940)="f4b89df9cacd9f96629332be521865a6aa1a66e90cc44a4ffaf74f52e82f32a910762af3a8029a337427b3df383f0df988f0a0ecf67800c4521735de9d56bacc24a5161ea040e79867777e68e703f455180e23231b9246a451ac5a88e7c1fdb65ea35371b797354f95d01c2fc58280d7ce8939b9bbd7b584c0b448309d0f551447f3b0568b65ca05352597b36c97fd085c", 0x91) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000540)={r6}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r6}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r4, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r10, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r10, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r7) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r9}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:57 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443ea999a6db33e4de4c5af50ebf91525906") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) [ 1120.594972] xprt_adjust_timeout: rq_timeout = 0! [ 1120.601123] xprt_adjust_timeout: rq_timeout = 0! [ 1120.608046] xprt_adjust_timeout: rq_timeout = 0! [ 1120.629213] FAULT_INJECTION: forcing a failure. [ 1120.629213] name failslab, interval 1, probability 0, space 0, times 0 [ 1120.640577] CPU: 1 PID: 22281 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1120.642569] xprt_adjust_timeout: rq_timeout = 0! [ 1120.647762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.647767] Call Trace: [ 1120.647787] dump_stack+0x194/0x24d [ 1120.647803] ? arch_local_irq_restore+0x53/0x53 [ 1120.647827] should_fail+0x8c0/0xa40 [ 1120.647838] ? perf_trace_lock_acquire+0xe3/0x980 [ 1120.647855] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1120.686314] ? trace_event_raw_event_lock+0x340/0x340 [ 1120.691483] ? perf_trace_lock+0x900/0x900 [ 1120.695698] ? mark_held_locks+0xaf/0x100 [ 1120.699835] ? __raw_spin_lock_init+0x1c/0x100 [ 1120.704401] ? find_held_lock+0x35/0x1d0 [ 1120.708445] ? __lock_is_held+0xb6/0x140 [ 1120.712492] ? check_same_owner+0x320/0x320 [ 1120.716791] ? d_alloc+0x269/0x340 [ 1120.720311] ? rcu_note_context_switch+0x710/0x710 [ 1120.725226] should_failslab+0xec/0x120 [ 1120.729177] kmem_cache_alloc+0x47/0x760 [ 1120.733222] ? d_drop+0x51/0x60 [ 1120.736480] ? rpc_i_callback+0x30/0x30 [ 1120.740433] rpc_alloc_inode+0x1a/0x20 [ 1120.744300] alloc_inode+0x65/0x180 [ 1120.747905] new_inode_pseudo+0x69/0x190 [ 1120.751943] ? prune_icache_sb+0x1a0/0x1a0 [ 1120.756153] ? do_raw_spin_trylock+0x190/0x190 [ 1120.760709] ? d_add+0xa70/0xa70 [ 1120.764055] new_inode+0x1c/0x40 [ 1120.767397] rpc_get_inode+0x20/0x1e0 [ 1120.771174] __rpc_create_common+0x5d/0x1d0 [ 1120.775477] rpc_populate.constprop.15+0x1ad/0x340 [ 1120.780387] rpc_fill_super+0x379/0xae0 [ 1120.784338] ? cap_capable+0x1b5/0x230 [ 1120.788202] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1120.793369] ? security_capable+0x8e/0xc0 [ 1120.797496] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1120.802661] ? ns_capable_common+0xcf/0x160 [ 1120.807134] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1120.812299] mount_ns+0xc4/0x190 [ 1120.815642] rpc_mount+0x9e/0xd0 [ 1120.818985] mount_fs+0x66/0x2d0 [ 1120.822331] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1120.826888] ? may_umount+0xa0/0xa0 [ 1120.830491] ? _raw_read_unlock+0x22/0x30 [ 1120.834615] ? __get_fs_type+0x8a/0xc0 [ 1120.838483] do_mount+0xea4/0x2bb0 [ 1120.842006] ? copy_mount_string+0x40/0x40 [ 1120.846225] ? rcu_pm_notify+0xc0/0xc0 [ 1120.850094] ? copy_mount_options+0x5f/0x2e0 [ 1120.854478] ? rcu_read_lock_sched_held+0x108/0x120 [ 1120.859471] ? kmem_cache_alloc_trace+0x459/0x740 [ 1120.864289] ? kasan_check_write+0x14/0x20 [ 1120.868501] ? _copy_from_user+0x99/0x110 [ 1120.872626] ? copy_mount_options+0x1f7/0x2e0 [ 1120.877098] SyS_mount+0xab/0x120 [ 1120.880526] ? copy_mnt_ns+0xb30/0xb30 [ 1120.884394] do_syscall_64+0x281/0x940 [ 1120.888261] ? vmalloc_sync_all+0x30/0x30 [ 1120.892384] ? _raw_spin_unlock_irq+0x27/0x70 [ 1120.896861] ? finish_task_switch+0x1c1/0x7e0 [ 1120.901333] ? syscall_return_slowpath+0x550/0x550 [ 1120.906238] ? syscall_return_slowpath+0x2ac/0x550 [ 1120.911146] ? prepare_exit_to_usermode+0x350/0x350 [ 1120.916140] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1120.921496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1120.926319] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1120.931484] RIP: 0033:0x454e79 [ 1120.934650] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1120.942338] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1120.949583] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1120.956829] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1120.964074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1120.971319] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000040 [ 1120.978776] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfs [ 1120.994109] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 22:20:58 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0x0, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:58 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:58 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb11") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:58 executing program 4 (fault-call:13 fault-nth:65): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1121.035882] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1121.056851] xprt_adjust_timeout: rq_timeout = 0! [ 1121.062655] REISERFS (device loop7): using ordered data mode [ 1121.068553] reiserfs: using flush barriers [ 1121.112992] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1121.147166] xprt_adjust_timeout: rq_timeout = 0! [ 1121.150279] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:20:58 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() r3 = perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000940)='./file0\x00', 0xfffffffffffffffa) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r6, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000540)={r6}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r6}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r4, 0x28, &(0x7f0000000800)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000400)={0x2, 0x0, [0x0, 0x0]}) sendmsg(r10, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r10, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r7) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r9}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1121.165476] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 1121.169579] xprt_adjust_timeout: rq_timeout = 0! [ 1121.209493] FAULT_INJECTION: forcing a failure. [ 1121.209493] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.220849] CPU: 0 PID: 22319 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1121.228041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1121.237402] Call Trace: [ 1121.240002] dump_stack+0x194/0x24d [ 1121.243644] ? arch_local_irq_restore+0x53/0x53 [ 1121.248347] should_fail+0x8c0/0xa40 [ 1121.252080] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/03/30 22:20:58 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(0xffffffffffffffff, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443ea999a6db33e4de4c5af50ebf91525906") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) [ 1121.257197] ? perf_trace_lock+0x900/0x900 [ 1121.261465] ? find_held_lock+0x35/0x1d0 [ 1121.265551] ? __lock_is_held+0xb6/0x140 [ 1121.269641] ? check_same_owner+0x320/0x320 [ 1121.273974] ? __d_lookup+0x4f4/0x830 [ 1121.277793] ? rcu_note_context_switch+0x710/0x710 [ 1121.282737] should_failslab+0xec/0x120 [ 1121.286704] kmem_cache_alloc+0x47/0x760 [ 1121.290763] __d_alloc+0xc1/0xbd0 [ 1121.294208] ? shrink_dcache_for_umount+0x290/0x290 [ 1121.299218] ? d_alloc_parallel+0x1b40/0x1b40 [ 1121.303701] ? lock_release+0xa40/0xa40 [ 1121.307667] ? mark_held_locks+0xaf/0x100 [ 1121.311802] ? d_lookup+0x133/0x2e0 [ 1121.315417] ? d_lookup+0x1d5/0x2e0 [ 1121.319035] d_alloc+0x8e/0x340 [ 1121.322298] ? __d_alloc+0xbd0/0xbd0 [ 1121.325993] ? full_name_hash+0x9b/0xe0 [ 1121.329965] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1121.335226] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1121.339458] rpc_populate.constprop.15+0xa3/0x340 [ 1121.344291] rpc_fill_super+0x379/0xae0 [ 1121.348251] ? cap_capable+0x1b5/0x230 [ 1121.352121] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1121.357295] ? security_capable+0x8e/0xc0 [ 1121.361426] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1121.366596] ? ns_capable_common+0xcf/0x160 [ 1121.370903] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1121.376071] mount_ns+0xc4/0x190 [ 1121.379420] rpc_mount+0x9e/0xd0 [ 1121.382772] mount_fs+0x66/0x2d0 [ 1121.386125] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1121.390692] ? may_umount+0xa0/0xa0 [ 1121.394305] ? _raw_read_unlock+0x22/0x30 [ 1121.398434] ? __get_fs_type+0x8a/0xc0 [ 1121.402310] do_mount+0xea4/0x2bb0 [ 1121.405840] ? copy_mount_string+0x40/0x40 [ 1121.410057] ? rcu_pm_notify+0xc0/0xc0 [ 1121.413933] ? copy_mount_options+0x5f/0x2e0 [ 1121.418328] ? rcu_read_lock_sched_held+0x108/0x120 [ 1121.423335] ? kmem_cache_alloc_trace+0x459/0x740 [ 1121.428162] ? kasan_check_write+0x14/0x20 [ 1121.432377] ? _copy_from_user+0x99/0x110 [ 1121.436511] ? copy_mount_options+0x1f7/0x2e0 [ 1121.440992] SyS_mount+0xab/0x120 [ 1121.444427] ? copy_mnt_ns+0xb30/0xb30 [ 1121.448299] do_syscall_64+0x281/0x940 [ 1121.452169] ? vmalloc_sync_all+0x30/0x30 [ 1121.456299] ? _raw_spin_unlock_irq+0x27/0x70 [ 1121.460779] ? finish_task_switch+0x1c1/0x7e0 [ 1121.465258] ? syscall_return_slowpath+0x550/0x550 [ 1121.470167] ? syscall_return_slowpath+0x2ac/0x550 [ 1121.475077] ? prepare_exit_to_usermode+0x350/0x350 [ 1121.480074] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1121.485424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1121.490256] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1121.495427] RIP: 0033:0x454e79 [ 1121.498597] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 22:20:58 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1121.506289] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1121.513539] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1121.520790] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1121.528042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1121.535290] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000041 [ 1121.544357] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 22:20:58 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0x0, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1121.578696] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1121.582650] xprt_adjust_timeout: rq_timeout = 0! [ 1121.605407] xprt_adjust_timeout: rq_timeout = 0! [ 1121.634613] REISERFS (device loop7): using ordered data mode [ 1121.640680] reiserfs: using flush barriers [ 1121.646650] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header 2018/03/30 22:20:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}], 0x6) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:20:58 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:58 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb11") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:58 executing program 6: r0 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000600)="74086e750000000000000000008c00", 0x0) bind$ax25(r1, &(0x7f00000005c0)={0x3, {"021fc1455fde3b"}}, 0x10) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, &(0x7f0000000080)=0x23, 0x102000004) write(r1, &(0x7f0000000300)="8be25f5790f664f32509e40d6f879d5add7e2d359c9a19afb750a2d2537a72839c9d1328e29a2d5c6db433c277cc7d345b87a34f1b417033d367cb0cfd6a25633f77aafb17e99c33cb65352c901ae75176f07bb0a4bb5ebff3d87eafaf00000000", 0x61) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000280)=0xe8) r4 = getpgid(0xffffffffffffffff) r5 = syz_open_procfs(r4, &(0x7f0000000380)='io\x00') setsockopt$inet_msfilter(r5, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="ffffff2517f6c704e85c8c47ffe00000010100000008000000ac14140de0000001ac14141200000000e0000001ac1414"], 0x1) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3317796f) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000840)={0x0, @in={{0x2, 0x4e22, @loopback=0x7f000001}}}, &(0x7f0000000900)=0x84) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000001e00)={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x401000000, {0x0, @in6={{0xa, 0x4e22, 0x200, @dev={0xfe, 0x80}, 0xfffffffffffffff9}}, 0x8, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000001ec0)=0xb0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000001f00)=@sack_info={0x0, 0x6, 0x10000000000}, &(0x7f0000001f40)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000b40)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000004cc0)=0x4) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f00000003c0)={0x7}, 0x4) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000540)={r6}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000004d80)={0x0, 0x1, 0x8, 0xfff, 0x2, 0x9}, &(0x7f0000004dc0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r5, 0x84, 0x7c, &(0x7f0000005180)={0x0, 0x3, 0x800}, &(0x7f00000051c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000005200)={0x0, @in6={{0xa, 0x4e24, 0x8, @mcast2={0xff, 0x2, [], 0x1}}}, 0x0, 0x2, 0x1000, 0xffffffff}, &(0x7f00000052c0)=0xffffffffffffffc5) getgroups(0x1, &(0x7f00000002c0)=[0x0]) fchown(r2, r3, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, &(0x7f0000000340)={0x0, 0x7, 0x101, 0x4}) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') read(r7, &(0x7f0000000080)=""/203, 0xcb) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000400)={0x4, 0x53, 0x5, 0x0, 0x8000, 0x4, 0x4, 0x2c9434ea, 0x5, 0x80000000}) [ 1121.689715] xprt_adjust_timeout: rq_timeout = 0! [ 1121.695468] xprt_adjust_timeout: rq_timeout = 0! [ 1121.708884] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 1121.788311] xprt_adjust_timeout: rq_timeout = 0! [ 1121.805237] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:20:59 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x800, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r3, 0x80dc5521, &(0x7f0000000880)=""/122) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r6, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000540)={r6}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r6}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000a40)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r4, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r10, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r10, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r7) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r9}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r11}, 0x48) 2018/03/30 22:20:59 executing program 4 (fault-call:13 fault-nth:66): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:20:59 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x0, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:59 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x0, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443ea999a6db33e4de4c5af50ebf91525906") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:20:59 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x49, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) write$rdma_cm(r0, &(0x7f0000000640)=@get_event={0xc, 0x8, 0xfa00, {&(0x7f00000004c0)}}, 0x10) close(r0) creat(&(0x7f0000000040)='./file0\x00', 0x0) tkill(r1, 0x1000000000016) 2018/03/30 22:20:59 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb11") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:59 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:20:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}], 0x6) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) [ 1122.689795] xprt_adjust_timeout: rq_timeout = 0! [ 1122.695338] xprt_adjust_timeout: rq_timeout = 0! [ 1122.700840] xprt_adjust_timeout: rq_timeout = 0! [ 1122.707263] xprt_adjust_timeout: rq_timeout = 0! [ 1122.724141] FAULT_INJECTION: forcing a failure. [ 1122.724141] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.735567] CPU: 0 PID: 22392 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1122.742757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1122.752099] Call Trace: [ 1122.754680] dump_stack+0x194/0x24d [ 1122.758296] ? arch_local_irq_restore+0x53/0x53 [ 1122.762960] should_fail+0x8c0/0xa40 [ 1122.766663] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1122.771748] ? trace_event_raw_event_lock+0x340/0x340 [ 1122.776933] ? find_held_lock+0x35/0x1d0 [ 1122.780986] ? __lock_is_held+0xb6/0x140 [ 1122.785053] ? check_same_owner+0x320/0x320 [ 1122.789366] ? d_alloc+0x269/0x340 [ 1122.792890] ? rcu_note_context_switch+0x710/0x710 [ 1122.797813] should_failslab+0xec/0x120 [ 1122.801770] kmem_cache_alloc+0x47/0x760 [ 1122.805818] ? d_drop+0x51/0x60 [ 1122.809088] ? rpc_i_callback+0x30/0x30 [ 1122.813049] rpc_alloc_inode+0x1a/0x20 [ 1122.816918] alloc_inode+0x65/0x180 [ 1122.820528] new_inode_pseudo+0x69/0x190 [ 1122.824575] ? prune_icache_sb+0x1a0/0x1a0 [ 1122.828794] ? do_raw_spin_trylock+0x190/0x190 [ 1122.833358] ? d_add+0xa70/0xa70 [ 1122.836712] new_inode+0x1c/0x40 [ 1122.840062] rpc_get_inode+0x20/0x1e0 [ 1122.843845] __rpc_create_common+0x5d/0x1d0 [ 1122.848154] rpc_populate.constprop.15+0x1ad/0x340 [ 1122.853074] rpc_fill_super+0x379/0xae0 [ 1122.857040] ? cap_capable+0x1b5/0x230 [ 1122.860911] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1122.866084] ? security_capable+0x8e/0xc0 [ 1122.870215] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1122.875385] ? ns_capable_common+0xcf/0x160 [ 1122.879690] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1122.884860] mount_ns+0xc4/0x190 [ 1122.888214] rpc_mount+0x9e/0xd0 [ 1122.891563] mount_fs+0x66/0x2d0 [ 1122.894917] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1122.899482] ? may_umount+0xa0/0xa0 [ 1122.903090] ? _raw_read_unlock+0x22/0x30 [ 1122.907218] ? __get_fs_type+0x8a/0xc0 [ 1122.911094] do_mount+0xea4/0x2bb0 [ 1122.914623] ? copy_mount_string+0x40/0x40 [ 1122.918839] ? rcu_pm_notify+0xc0/0xc0 [ 1122.922714] ? copy_mount_options+0x5f/0x2e0 [ 1122.927107] ? rcu_read_lock_sched_held+0x108/0x120 [ 1122.932109] ? kmem_cache_alloc_trace+0x459/0x740 [ 1122.936934] ? kasan_check_write+0x14/0x20 [ 1122.941150] ? _copy_from_user+0x99/0x110 [ 1122.945281] ? copy_mount_options+0x1f7/0x2e0 [ 1122.949768] SyS_mount+0xab/0x120 [ 1122.953203] ? copy_mnt_ns+0xb30/0xb30 [ 1122.957074] do_syscall_64+0x281/0x940 [ 1122.960942] ? vmalloc_sync_all+0x30/0x30 [ 1122.965068] ? _raw_spin_unlock_irq+0x27/0x70 [ 1122.969563] ? finish_task_switch+0x1c1/0x7e0 [ 1122.974045] ? syscall_return_slowpath+0x550/0x550 [ 1122.978955] ? syscall_return_slowpath+0x2ac/0x550 [ 1122.983864] ? prepare_exit_to_usermode+0x350/0x350 [ 1122.988861] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1122.994210] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1122.999058] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1123.004228] RIP: 0033:0x454e79 [ 1123.007395] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1123.015084] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1123.022333] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1123.029582] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/03/30 22:21:00 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x0, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1123.036829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1123.044077] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000042 [ 1123.051582] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry portmap [ 1123.076686] xprt_adjust_timeout: rq_timeout = 0! [ 1123.082489] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal 2018/03/30 22:21:00 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb1104") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1123.113204] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 1123.127175] REISERFS (device loop7): using ordered data mode [ 1123.133092] reiserfs: using flush barriers 2018/03/30 22:21:00 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r4, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000540)={r4}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r4}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1123.170315] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1123.193307] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:00 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x31a}, {&(0x7f0000000940)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10024) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r6, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000400)) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000540)={r6}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r6}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r4, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r10, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r10, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r7) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r9}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:00 executing program 4 (fault-call:13 fault-nth:67): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1123.216781] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 1123.238667] xprt_adjust_timeout: rq_timeout = 0! [ 1123.273631] xprt_adjust_timeout: rq_timeout = 0! [ 1123.279092] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:00 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb1104") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1123.329079] xprt_adjust_timeout: rq_timeout = 0! [ 1123.352157] FAULT_INJECTION: forcing a failure. [ 1123.352157] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.363509] CPU: 1 PID: 22423 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1123.370695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1123.380045] Call Trace: [ 1123.382633] dump_stack+0x194/0x24d [ 1123.386267] ? arch_local_irq_restore+0x53/0x53 [ 1123.390949] should_fail+0x8c0/0xa40 [ 1123.394673] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1123.399780] ? perf_trace_lock+0x900/0x900 [ 1123.404024] ? __lock_acquire+0x664/0x3e00 [ 1123.408264] ? find_held_lock+0x35/0x1d0 [ 1123.412328] ? __lock_is_held+0xb6/0x140 [ 1123.416390] ? check_same_owner+0x320/0x320 [ 1123.420693] ? __d_lookup+0x4f4/0x830 [ 1123.424480] ? rcu_note_context_switch+0x710/0x710 [ 1123.429399] should_failslab+0xec/0x120 [ 1123.433361] kmem_cache_alloc+0x47/0x760 [ 1123.437408] __d_alloc+0xc1/0xbd0 [ 1123.440843] ? shrink_dcache_for_umount+0x290/0x290 [ 1123.445836] ? d_alloc_parallel+0x1b40/0x1b40 [ 1123.450310] ? lock_release+0xa40/0xa40 [ 1123.454263] ? mark_held_locks+0xaf/0x100 [ 1123.458387] ? d_lookup+0x133/0x2e0 [ 1123.461993] ? d_lookup+0x1d5/0x2e0 [ 1123.465607] d_alloc+0x8e/0x340 [ 1123.468862] ? __d_alloc+0xbd0/0xbd0 [ 1123.472555] ? full_name_hash+0x9b/0xe0 [ 1123.476516] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1123.481771] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1123.485991] rpc_populate.constprop.15+0xa3/0x340 [ 1123.490822] rpc_fill_super+0x379/0xae0 [ 1123.494776] ? cap_capable+0x1b5/0x230 [ 1123.498643] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1123.503815] ? security_capable+0x8e/0xc0 [ 1123.507946] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1123.513115] ? ns_capable_common+0xcf/0x160 [ 1123.517415] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1123.522584] mount_ns+0xc4/0x190 [ 1123.525928] rpc_mount+0x9e/0xd0 [ 1123.529271] mount_fs+0x66/0x2d0 [ 1123.532616] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1123.537177] ? may_umount+0xa0/0xa0 [ 1123.540785] ? _raw_read_unlock+0x22/0x30 [ 1123.544907] ? __get_fs_type+0x8a/0xc0 [ 1123.548772] do_mount+0xea4/0x2bb0 [ 1123.552294] ? copy_mount_string+0x40/0x40 [ 1123.556505] ? rcu_pm_notify+0xc0/0xc0 [ 1123.560372] ? copy_mount_options+0x5f/0x2e0 [ 1123.564758] ? rcu_read_lock_sched_held+0x108/0x120 [ 1123.569750] ? kmem_cache_alloc_trace+0x459/0x740 [ 1123.574570] ? kasan_check_write+0x14/0x20 [ 1123.578784] ? copy_mount_options+0x1f7/0x2e0 [ 1123.583257] SyS_mount+0xab/0x120 [ 1123.586685] ? copy_mnt_ns+0xb30/0xb30 [ 1123.590552] do_syscall_64+0x281/0x940 [ 1123.594414] ? vmalloc_sync_all+0x30/0x30 [ 1123.598539] ? _raw_spin_unlock_irq+0x27/0x70 [ 1123.603015] ? finish_task_switch+0x1c1/0x7e0 [ 1123.607494] ? syscall_return_slowpath+0x550/0x550 [ 1123.612401] ? syscall_return_slowpath+0x2ac/0x550 [ 1123.617306] ? prepare_exit_to_usermode+0x350/0x350 [ 1123.622301] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1123.627649] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1123.632475] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1123.637641] RIP: 0033:0x454e79 [ 1123.640807] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1123.648492] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1123.655737] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1123.662986] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1123.670234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1123.677479] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000043 [ 1123.750569] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 1123.890085] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:01 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb1104") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:01 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0xfe87, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x8}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) getsockopt$kcm_KCM_RECV_DISABLE(r7, 0x119, 0x1, &(0x7f0000000400), 0x4) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:01 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x0, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:01 executing program 6: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000260000), 0x0, 0x20000001, &(0x7f0000476694)={0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) recvmsg(r0, &(0x7f000074d000)={&(0x7f0000000000)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x12a, &(0x7f0000ba0f90), 0x0, &(0x7f0000635fd0)=""/101, 0x65}, 0x0) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f0000b0fffc)=0x58, 0x0) sendmsg$nl_crypto(r2, &(0x7f0000484fc8)={&(0x7f0000816000)={0x10}, 0xc, &(0x7f00000ca000)={&(0x7f0000fa3000)=@get={0xe0, 0x13, 0x0, 0x0, 0x0, {{'cbc-aes-aesni\x00'}}}, 0xffffff34}, 0x1}, 0x0) 2018/03/30 22:21:01 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r4, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000540)={r4}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r4}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:01 executing program 4 (fault-call:13 fault-nth:68): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:21:01 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x0, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443ea999a6db33e4de4c5af50ebf91525906") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:21:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) [ 1124.100285] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 1124.111556] xprt_adjust_timeout: rq_timeout = 0! [ 1124.112710] xprt_adjust_timeout: rq_timeout = 0! [ 1124.130450] xprt_adjust_timeout: rq_timeout = 0! [ 1124.148124] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:01 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x0, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1124.176145] xprt_adjust_timeout: rq_timeout = 0! [ 1124.205916] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1124.246920] FAULT_INJECTION: forcing a failure. [ 1124.246920] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.249856] REISERFS (device loop7): using ordered data mode [ 1124.258274] CPU: 0 PID: 22459 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1124.258284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1124.258291] Call Trace: [ 1124.258315] dump_stack+0x194/0x24d [ 1124.264121] reiserfs: using flush barriers [ 1124.271283] ? arch_local_irq_restore+0x53/0x53 2018/03/30 22:21:01 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r4, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000540)={r4}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r4}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:01 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(0xffffffffffffffff) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1124.271317] should_fail+0x8c0/0xa40 [ 1124.291563] xprt_adjust_timeout: rq_timeout = 0! [ 1124.295716] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1124.295734] ? trace_event_raw_event_lock+0x340/0x340 [ 1124.295770] ? find_held_lock+0x35/0x1d0 [ 1124.295791] ? __lock_is_held+0xb6/0x140 [ 1124.295820] ? check_same_owner+0x320/0x320 [ 1124.326920] ? d_alloc+0x269/0x340 [ 1124.330480] ? rcu_note_context_switch+0x710/0x710 [ 1124.335433] should_failslab+0xec/0x120 [ 1124.339421] kmem_cache_alloc+0x47/0x760 [ 1124.343501] ? d_drop+0x51/0x60 2018/03/30 22:21:01 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f00000002c0)={r6}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1124.346792] ? rpc_i_callback+0x30/0x30 [ 1124.350772] rpc_alloc_inode+0x1a/0x20 [ 1124.354669] alloc_inode+0x65/0x180 [ 1124.358304] new_inode_pseudo+0x69/0x190 [ 1124.362370] ? prune_icache_sb+0x1a0/0x1a0 [ 1124.366607] ? do_raw_spin_trylock+0x190/0x190 [ 1124.371198] ? d_add+0xa70/0xa70 [ 1124.374577] new_inode+0x1c/0x40 [ 1124.377945] rpc_get_inode+0x20/0x1e0 [ 1124.381755] __rpc_create_common+0x5d/0x1d0 [ 1124.382943] xprt_adjust_timeout: rq_timeout = 0! [ 1124.386080] rpc_populate.constprop.15+0x1ad/0x340 [ 1124.386107] rpc_fill_super+0x379/0xae0 [ 1124.386126] ? cap_capable+0x1b5/0x230 [ 1124.386139] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1124.386157] ? security_capable+0x8e/0xc0 [ 1124.386170] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1124.386181] ? ns_capable_common+0xcf/0x160 [ 1124.386196] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1124.403098] xprt_adjust_timeout: rq_timeout = 0! [ 1124.403673] mount_ns+0xc4/0x190 [ 1124.403694] rpc_mount+0x9e/0xd0 [ 1124.403713] mount_fs+0x66/0x2d0 [ 1124.442412] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1124.446980] ? may_umount+0xa0/0xa0 [ 1124.450591] ? _raw_read_unlock+0x22/0x30 [ 1124.454722] ? __get_fs_type+0x8a/0xc0 [ 1124.458595] do_mount+0xea4/0x2bb0 [ 1124.462122] ? copy_mount_string+0x40/0x40 [ 1124.466344] ? rcu_pm_notify+0xc0/0xc0 [ 1124.470222] ? copy_mount_options+0x5f/0x2e0 [ 1124.474612] ? rcu_read_lock_sched_held+0x108/0x120 [ 1124.479611] ? kmem_cache_alloc_trace+0x459/0x740 [ 1124.484439] ? kasan_check_write+0x14/0x20 [ 1124.488659] ? copy_mount_options+0x1f7/0x2e0 [ 1124.493139] SyS_mount+0xab/0x120 [ 1124.496571] ? copy_mnt_ns+0xb30/0xb30 [ 1124.500443] do_syscall_64+0x281/0x940 [ 1124.504311] ? vmalloc_sync_all+0x30/0x30 [ 1124.508444] ? _raw_spin_unlock_irq+0x27/0x70 [ 1124.512923] ? finish_task_switch+0x1c1/0x7e0 [ 1124.517402] ? syscall_return_slowpath+0x550/0x550 [ 1124.522329] ? syscall_return_slowpath+0x2ac/0x550 [ 1124.527242] ? prepare_exit_to_usermode+0x350/0x350 [ 1124.532248] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1124.537601] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1124.542434] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1124.547604] RIP: 0033:0x454e79 [ 1124.550774] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1124.558466] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1124.565718] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1124.572965] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1124.580218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1124.587467] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000044 2018/03/30 22:21:01 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x0, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1124.595004] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry portmap [ 1124.609560] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1124.633674] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 1124.650193] xprt_adjust_timeout: rq_timeout = 0! [ 1124.655654] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 1124.687216] xprt_adjust_timeout: rq_timeout = 0! [ 1124.711524] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:02 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(0xffffffffffffffff) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:02 executing program 4 (fault-call:13 fault-nth:69): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:21:02 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r4, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000540)={r4}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r4}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:02 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x0, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443ea999a6db33e4de4c5af50ebf91525906") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:21:02 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x102) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) ioctl$KVM_SET_CPUID(r6, 0x4008ae8a, &(0x7f0000000940)=ANY=[@ANYBLOB="060000000d00000001000040ffff1023b531ec1bf8520000ff010000000000000a0000c002000000010000000500000000000000000000000d0000000200000003000000b2000000070000000008000000000040010096d87f000000080000000700000000000000060000000004000005000000d70b0000060000000000000000000080ffffff7f00000000010000000300000000000000"]) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x40000007, 0x9, &(0x7f0000000880)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:21:02 executing program 6: perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x20000000000002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) io_setup(0x0, &(0x7f00000001c0)) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0xffffffffffeffffe, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 2018/03/30 22:21:02 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x0, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1125.230573] xprt_adjust_timeout: rq_timeout = 0! [ 1125.241387] xprt_adjust_timeout: rq_timeout = 0! [ 1125.243206] xprt_adjust_timeout: rq_timeout = 0! [ 1125.251217] xprt_adjust_timeout: rq_timeout = 0! [ 1125.252693] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1125.277669] FAULT_INJECTION: forcing a failure. [ 1125.277669] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.288979] CPU: 1 PID: 22512 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1125.296162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1125.305508] Call Trace: [ 1125.308096] dump_stack+0x194/0x24d [ 1125.311601] REISERFS (device loop7): using ordered data mode [ 1125.311722] ? arch_local_irq_restore+0x53/0x53 [ 1125.317606] reiserfs: using flush barriers [ 1125.322161] should_fail+0x8c0/0xa40 [ 1125.322179] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1125.322193] ? perf_trace_lock+0x900/0x900 [ 1125.322205] ? __lock_acquire+0x664/0x3e00 [ 1125.328491] xprt_adjust_timeout: rq_timeout = 0! [ 1125.330125] ? find_held_lock+0x35/0x1d0 [ 1125.330143] ? __lock_is_held+0xb6/0x140 [ 1125.330169] ? check_same_owner+0x320/0x320 [ 1125.330177] ? __d_lookup+0x4f4/0x830 [ 1125.330192] ? rcu_note_context_switch+0x710/0x710 [ 1125.369429] should_failslab+0xec/0x120 [ 1125.373383] kmem_cache_alloc+0x47/0x760 [ 1125.377428] __d_alloc+0xc1/0xbd0 [ 1125.380866] ? shrink_dcache_for_umount+0x290/0x290 [ 1125.385859] ? d_alloc_parallel+0x1b40/0x1b40 [ 1125.390335] ? lock_release+0xa40/0xa40 [ 1125.394297] ? mark_held_locks+0xaf/0x100 [ 1125.398425] ? d_lookup+0x133/0x2e0 [ 1125.402037] ? d_lookup+0x1d5/0x2e0 [ 1125.405642] d_alloc+0x8e/0x340 [ 1125.408900] ? __d_alloc+0xbd0/0xbd0 [ 1125.412592] ? full_name_hash+0x9b/0xe0 [ 1125.416548] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1125.421800] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1125.426023] rpc_populate.constprop.15+0xa3/0x340 [ 1125.430852] rpc_fill_super+0x379/0xae0 [ 1125.434808] ? cap_capable+0x1b5/0x230 [ 1125.438671] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1125.443842] ? security_capable+0x8e/0xc0 [ 1125.447970] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1125.453134] ? ns_capable_common+0xcf/0x160 [ 1125.457435] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1125.462599] mount_ns+0xc4/0x190 [ 1125.465945] rpc_mount+0x9e/0xd0 [ 1125.469289] mount_fs+0x66/0x2d0 [ 1125.472634] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1125.477192] ? may_umount+0xa0/0xa0 [ 1125.480796] ? _raw_read_unlock+0x22/0x30 [ 1125.484921] ? __get_fs_type+0x8a/0xc0 [ 1125.488789] do_mount+0xea4/0x2bb0 [ 1125.492310] ? copy_mount_string+0x40/0x40 [ 1125.496523] ? rcu_pm_notify+0xc0/0xc0 [ 1125.500394] ? copy_mount_options+0x5f/0x2e0 [ 1125.504778] ? rcu_read_lock_sched_held+0x108/0x120 [ 1125.509768] ? kmem_cache_alloc_trace+0x459/0x740 [ 1125.514589] ? kasan_check_write+0x14/0x20 [ 1125.518800] ? _copy_from_user+0x99/0x110 [ 1125.522925] ? copy_mount_options+0x1f7/0x2e0 [ 1125.527396] SyS_mount+0xab/0x120 [ 1125.530824] ? copy_mnt_ns+0xb30/0xb30 [ 1125.534690] do_syscall_64+0x281/0x940 [ 1125.538554] ? vmalloc_sync_all+0x30/0x30 [ 1125.542676] ? _raw_spin_unlock_irq+0x27/0x70 [ 1125.547146] ? finish_task_switch+0x1c1/0x7e0 [ 1125.551617] ? syscall_return_slowpath+0x550/0x550 [ 1125.556522] ? syscall_return_slowpath+0x2ac/0x550 [ 1125.561427] ? prepare_exit_to_usermode+0x350/0x350 [ 1125.566418] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1125.571760] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1125.576584] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1125.581751] RIP: 0033:0x454e79 [ 1125.584917] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1125.592603] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1125.599851] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1125.607094] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1125.614339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1125.621583] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000045 2018/03/30 22:21:02 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r4, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000540)={r4}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r4}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1125.631759] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 22:21:02 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x80) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1125.679840] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1125.717387] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space 2018/03/30 22:21:02 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(0xffffffffffffffff) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:02 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1125.737209] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:02 executing program 4 (fault-call:13 fault-nth:70): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1125.792718] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:02 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)) syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:21:02 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1125.819735] xprt_adjust_timeout: rq_timeout = 0! [ 1125.822897] xprt_adjust_timeout: rq_timeout = 0! [ 1125.858419] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:02 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r4, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000540)={r4}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r4}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:03 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1125.946453] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1125.966213] xprt_adjust_timeout: rq_timeout = 0! [ 1125.974504] xprt_adjust_timeout: rq_timeout = 0! [ 1125.989516] REISERFS (device loop7): using ordered data mode 2018/03/30 22:21:03 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00'}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:03 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1125.995481] reiserfs: using flush barriers [ 1126.013208] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1126.032576] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:03 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1126.038014] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 1126.057893] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:03 executing program 6: socketpair(0xa, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(r1, &(0x7f0000000180)=""/68, 0x44, 0x100, 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000000c0)={0x1, 0x1dc, 0x401, 0x8}, 0x6) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = accept4(r1, &(0x7f0000000280)=@rc, &(0x7f0000000300)=0x80, 0x80000) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, 0x1c) splice(r2, &(0x7f0000000200), r0, &(0x7f0000000240), 0x1, 0x8) ioctl$sock_inet_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000340)={'lo\x00', {0x2, 0x4e24, @broadcast=0xffffffff}}) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040)=0xffff, 0x4) recvfrom$inet6(r3, &(0x7f0000000380)=""/19, 0x13, 0x40000000, &(0x7f00000003c0)={0xa, 0x4e21, 0x85, @mcast1={0xff, 0x1, [], 0x1}, 0xffffffffffffff00}, 0x1c) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0], 0x2}) sendmsg(r2, &(0x7f0000022000)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000780)}], 0x1, &(0x7f0000004ff0)}, 0x0) [ 1126.110302] xprt_adjust_timeout: rq_timeout = 0! [ 1126.146448] xprt_adjust_timeout: rq_timeout = 0! [ 1126.161703] xprt_adjust_timeout: rq_timeout = 0! [ 1126.268364] FAULT_INJECTION: forcing a failure. [ 1126.268364] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.279714] CPU: 0 PID: 22562 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1126.286910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.296267] Call Trace: [ 1126.298868] dump_stack+0x194/0x24d [ 1126.302512] ? arch_local_irq_restore+0x53/0x53 [ 1126.307207] should_fail+0x8c0/0xa40 [ 1126.310935] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1126.316043] ? trace_event_raw_event_lock+0x340/0x340 [ 1126.321239] ? find_held_lock+0x35/0x1d0 [ 1126.325293] ? __lock_is_held+0xb6/0x140 [ 1126.329359] ? check_same_owner+0x320/0x320 [ 1126.333663] ? d_alloc+0x269/0x340 [ 1126.337226] ? rcu_note_context_switch+0x710/0x710 [ 1126.342154] should_failslab+0xec/0x120 [ 1126.346111] kmem_cache_alloc+0x47/0x760 [ 1126.350160] ? d_drop+0x51/0x60 [ 1126.353427] ? rpc_i_callback+0x30/0x30 [ 1126.357386] rpc_alloc_inode+0x1a/0x20 [ 1126.361256] alloc_inode+0x65/0x180 [ 1126.364869] new_inode_pseudo+0x69/0x190 [ 1126.368914] ? prune_icache_sb+0x1a0/0x1a0 [ 1126.373134] ? do_raw_spin_trylock+0x190/0x190 [ 1126.377699] ? d_add+0xa70/0xa70 [ 1126.381060] new_inode+0x1c/0x40 [ 1126.384410] rpc_get_inode+0x20/0x1e0 [ 1126.388196] __rpc_create_common+0x5d/0x1d0 [ 1126.392508] rpc_populate.constprop.15+0x1ad/0x340 [ 1126.397435] rpc_fill_super+0x379/0xae0 [ 1126.401402] ? cap_capable+0x1b5/0x230 [ 1126.405272] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1126.410452] ? security_capable+0x8e/0xc0 [ 1126.414584] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1126.419756] ? ns_capable_common+0xcf/0x160 [ 1126.424067] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1126.429238] mount_ns+0xc4/0x190 [ 1126.432592] rpc_mount+0x9e/0xd0 [ 1126.435945] mount_fs+0x66/0x2d0 [ 1126.439307] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1126.443873] ? may_umount+0xa0/0xa0 [ 1126.447484] ? _raw_read_unlock+0x22/0x30 [ 1126.451615] ? __get_fs_type+0x8a/0xc0 [ 1126.455494] do_mount+0xea4/0x2bb0 [ 1126.459033] ? copy_mount_string+0x40/0x40 [ 1126.463250] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1126.468253] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1126.473001] ? retint_kernel+0x10/0x10 [ 1126.476885] ? copy_mount_options+0x18b/0x2e0 [ 1126.481367] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1126.486192] ? copy_mount_options+0x1f7/0x2e0 [ 1126.490674] SyS_mount+0xab/0x120 [ 1126.494107] ? copy_mnt_ns+0xb30/0xb30 [ 1126.497977] do_syscall_64+0x281/0x940 [ 1126.501847] ? vmalloc_sync_all+0x30/0x30 [ 1126.505977] ? _raw_spin_unlock_irq+0x27/0x70 [ 1126.510456] ? finish_task_switch+0x1c1/0x7e0 [ 1126.514934] ? syscall_return_slowpath+0x550/0x550 [ 1126.519847] ? syscall_return_slowpath+0x2ac/0x550 [ 1126.524761] ? prepare_exit_to_usermode+0x350/0x350 [ 1126.529770] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1126.535129] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1126.539967] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1126.545139] RIP: 0033:0x454e79 [ 1126.548311] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1126.556010] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 2018/03/30 22:21:03 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:21:03 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:03 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)) syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:21:03 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00'}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1126.563271] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1126.570531] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1126.577782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1126.585038] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000046 [ 1126.592478] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfsd4_cb [ 1126.602892] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 22:21:03 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x9}, r2, 0x1, r1, 0xa) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(r3, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0xffffffffffffffbb}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r6, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r6}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) sendmmsg(r5, &(0x7f0000001780)=[{{&(0x7f0000000880)=@in6={0xa, 0x4e24, 0x55d, @mcast1={0xff, 0x1, [], 0x1}, 0x100000000}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000400)="0f2d6bc94fc6849f31320609c5c1599ade084888a9", 0x15}, {&(0x7f0000000940)="74285c89d3722fe1a12eacf0854b2da1ab100e020a448bcbf0f7df5f82a082d9cba1cf94bf57bea981ff6c6366aa0be11575c0823a43d73e1bd842b43856763065e46f0aef962b87973b5f3b9c85cae9ac", 0x51}, {&(0x7f00000019c0)="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", 0x1000}, {&(0x7f00000009c0)="d2671502755a33d0cd64009d9ac683031bcb9fde0caddf03bd1184aaad39fdc85030dd6fd5bae2e0e0de4e3a31891dad57049f5254cdfa6f7907b9ce26cd5931caab82514496c7948829a2ed01df1e3f49bc698fb8316db7e011df6fa0a49e3cbf073b9e24daba610976d9a6d6737818b4e27478343b49f18a9b1d1fddeb1a6f73860f1bdf8f3d23ae25335ed350064b18dfe288697b7f6bc904e469d365a2957f968f9b7f535d7c4be431913fc830538f996f59ebfccfea0ca3850457cbc153f4342b9c34e75db4d7d38cec17d7edce74cbff5c71985c361c779fed16b165e6b1463545ee0af2fad8be02e2f45595aeb3d0dc638c", 0xf5}, {&(0x7f00000029c0)="ec90cd9c609813d421f258166375cd62fee6b365a1df3b02675edd56967ded6b9cc6af28b7905ab93e60890ebe2a73a63148c544f3de09c0209fbf607040003175aee00195241ba2ec82e4c5de26c3aa89bdc7863b31b29212f9602fde366dc3b6a5734cd3a58730868d4ae4f5f5cff3f06908d1ef792553f6ddf69b3141eb9b9482d4e1828475cdcb9a2bfd784cc47ced5c3d451a946f0c0a840a5cf4f994c9b461199c8db0d9f420c3f096506439e133157bfc465e7887edd5a39a46bfdbd1e4c5f1db91650ba228ed8bf698635e241c94f3f2cf22268154e98e03400bbe1dd7ad57515b28b1fa9bba027d6c3355f662fae66286678f83da22681fabf0a66e354d96efaaebe243c14c7b110e3650cb665f131426413957ccb58a42e3ad5cf63edb98434adec7cf2c037c1a931443642fe086973af75b90a112bd05943b5645b8a316e64b429eb71d0f8c003b22af4fbd2a7271f824e32f54c80b7bf9aa84c23d1620d765387aa8647a0f63a5386a3d911aa511e799288b4c512c28f1a3d4d2b002eeb27e2877eda427ba6671eb24cb7b73d10e130ba22325d0397d52454633f6f4150b6be8eea1d6b5065ca18bc02851dd04069d6dce183edd2c804f81d1f1c144f5eb9debfcb447f41042bf20793dda5a9e98b204dd23560a62042bd4ac4faeb7b112d0bb3c96f4dbf9aae3cf49e1ccfde0b624ab2efc137a9c8ae6e8b3c1bf66de4f36eb0a240270b1039eff4d23b9197e282e731b36d35abbd5fc0b053ad80ae4186bf1038d4c01e02677cb0a10ce1267855a21cc9544f702d88b2c717980a67f74adeb5c4241e84802f49e2e511e76a6f8dba1d74c6aedecef8d8f0d9be08bc6d3090cf80521acde6ff1c70c83a9f17cc2b7a03be10641d0a5e193a4060440425da1425367ebd660eb536549061b7547e29188e9988d63872aa7721c9a7a5c7566332fae8fa5099518a415efd0f1be7b513d1e7a019a37e5e5930e4e77cec42ad7ac259e55a588c222761e75c25bc915e464c23ff3923e904184aabc0ebfae3c211d28d2a8bd8208da50ef509aabebfccca73fc7461aff38eea37898fd42e69a6e66fd9f4fbf0411ecee1fc9e6d63b6325adaf73f7faa50bf8c27ad031e9abf50f8e391544245e5154385a2f22cfcbfcb33a92735876da04203235e8e2be2663c2ae0c1c674f46756f0ce122d374660805db3d6e3665a908f3f39b0c639eb56550e4bee59998e6fefa26dd5b74fbf49fed154363c5baacefc21c4dbd4a5e4234c7a07f6f67e5825c63ba24f7d3e78bd87c55fcd2f479a9dbf426a9aa02a9315c9224304006a71964c24d56c2dac4edcd6d8a175e0357b1858fc228d82de71195e089b7c6df7ba99b8b1efd4ce09174d51171d5b0eba6d1b1b4c54af125c5497c940ddcb0e31a4ca4012ca876388291bd502dc04bf778f7005a1f9722478fc1f768b495e09dfc215bd97964a1eadb47ed37db3516dd2dec85606ec0118b2acc270010aa64bbeb0ae8ca193bb7ab8c8844a8146c5d6b4e86627c28e5aaddda80decc6f772867337085e8ef7c17b5e09fdc886ddc0930e2ecd15b57bfa3e23952b63ff1e56271a717aca7f340bfc67d1ddd94c3fff5b8f354bbfb052c18347fdf0d0bdf18d0afc69ad3668d275e8c5dc5c88ee96c15b45ee85be7902b9e787966ff8668b13f13ddc1acd09255fbc878502a3833fc7cabf39409f2525af2a2658bc0d67a831c80af36207656cfac821e64d34d80c599cc214b4f7c1ec2045021d4d17653c43c9cc107bc04190f500d9b0c2b0d1df7743e47a1774c744942f095f7f7f17fdc4ff1010e0fa4700e6714050a1234862e977bd5e206eee7c8dc6fae061e995d7a8abb66f00ffb7fe3836c5440b18cc3509df6f97b4c6c75d54a775ac9a961d0e7151bee5760b36b797f55c9d74c860c36be43666b5e296088795a9b7a0d43860d2bc935f3d9bf7b21a57a1e9c7863ee64dd5c16b20f6e21c372a872732d6cced943191744a8f456354ee7007b93489d5270478acbbb069c760a1cb2c088769a06d464fad35767c9b3fe12df826cdbc3d7e8a4bce6b59f6c9fb89a7ddda00ef618951592f28e2fcfadcfed970578d519dd48d72c9ff93dc3141a0bc5532b74ccf02c7e4e7daf09a11696ebdbf951267325b9b5459dfbe3aec311fa3ff79f503d5efe1c57ab64c4a3362307dd62658109dedfa7a3869dd1cd493c4f259aeb9ceb4c0e1225706d24ec33a86de484178f6e0e65318d17a4d446710948b5d1d5be687333b7439e7d7915eb0ecc081819d7221cde8e12eeb2804a8ec00f16c040001cedd4bb64c244d78e017255a188b2e9789ceb59b5ba5448808cacd046459d890e521fc867ff7c28aad86fff30b61b42d92b4492a07ac1d1d900122868de4802bfc5b9a4b70fb3ab82b32beabb8f49f553a336b651cc2faf266c96386595c15dc125488fbb698da8e02b6636b75b72640eecd1896a4ded945be8e14ecda51058edea8d0f72ff06876421a077d08de115e1e1a48b66aa653f343f8e1052db7fbad8b3399677f26d8d38a98c8a4b6930d24cba09f2b0609db71f95d989929e39df05265e8fddc3fcf3a079cc5bb3f9e86b6184192f5d75ed8be7f184c942b5fa6b53aaaa26384a1cbde4967ea454e0def2b6dcb17a59baeaf1c258dca3c4ff0998b3710edf9c2292238fb2a2c51a29f5c62fb368a99d6bb12ca06a71205bbf220f6303585149c4b6d42b03f90111f7d260d9ab481944b36bf1fef44fc9c8d918ec29ee4732e9002d2c4a5955db00b46554397d09200f15381433fb0dc764c8d2cf027f6c6baa2a8babd0cce6b4d5ddf9afc29e815f42cbd8ae6c53d3d8a9e5c8403d5205e8ce134244caa9d0e1ca61edadaa5e3117da2d05a2fe6e3e523858047c1bb5469f5ebe112ef233526d92bfb64291c157f67d2d91da2df1430967eb7727ebe2d09be43f906d64ee83708e0b7353bd4efd8b2ed700c007bb8491aedf6db45c8d0367ac0c7e8ea17edc5fc293dc6e900d60f0c3332dca81f691bd9cf4301c51b4f80926be7f8d27e65fba062a8113779218b1653af35f6ccb01c86005c6e0133dc58e1a0a909e6048d755a5734f901dc834e569ed99fc45354caed2e6b63ad40c638bb7c12d80dd0dc058e2e2b03a08087d5a219b8178bb0b696c9c40b581410d386de354edc616a551af5016b24b6bedd82226fe720c387d9c2cfa72670702e266e85ebff38287dc52038ec428a16c82e4a6638fe41b44dcd239c01264ac736402e9278ed887562a58f9e1814e5720516c976b8e6d389a886bb703541d7768da51135f0ad672059328fb65da508613bd6c3ae9d2d4eb56463d50159f63613d4b5d6f8b345e65e1a832551f90f44e9601186a11124cb3ce308e2f3a414db521caa4d8e231c166730d80dc27ccc67dd75aa6a96ac4759e23006ff2583f098739d621f675622e94d93927b5c1487127652c6d23030796778fe4121a0ba0dea33bc7ee6d3085aa7e92c4d9a18eb1d96c178687bc46a2b2f0d9bab08557eb7b64ab17e8197cb3bf102a5ed083969107e434aab7d6d894818d3187c6ad6e7225154fc43f21e7dcd29e10317ead23ccd340b24afbab9ccab1f277d7a61bdda6b1518fb4b5cea790bc2f759ab8d2ed25679d2a7c8512ff60a30c8364f1bdc2b45051d68dbd16c2f73a3e05803d4095fd04df16e93a93de38b943c5d86bd1e12d1b8ed819a53a4e2b169e95272807b1034d0ebf6f62389d91d75cd320fa6aae240d0f04dca1772823403ee6209e21eef184df7679c02106740bee58b717e8c89ff3b260a8f68ae8fa31da8da671fefecc92c7d5366150cd7522354f5ecad5942ffdceb568941a2f829538f56c44d5ade80e6fb09cb8b1a05d4f2c7424827595bfce2a201090ad7ac530dad63875b7afd9fef2f7c4c84e546f132bdb2c2631895c721a22fa39d2e06932e1d609dc6b20be0343dd84aaa80f81d818d35cdf5194da07a84d15d6b36cc94a8eff372f88fe8ee0b95a0c0ed66a2808783ade075413a2a7a9ab63ea6866ed27b9b2d51341d37400bc3eafb0e415340372bba1ad37b3fc0406c27dd29852d2ba401f18dcfa9609ce8710bcbf09ca32475b7b6860e91916b0c072c2588ac775192e862c19dcebfc7b2d6170740c06955cdbc751d7a1760b69ecbac88c202bdde6108280b37cc21825076fcce2e05dbce58820caf7879d622dd01233a6ed852bdb04dd82b4ea66897e93cfced2a62c7c356368849b7f17fb9d303954759ae362c4c339f501a9415c3ca585c7b9fa71f06453db462bcef6b96038c818ba3db08204ed6503e1e87afb84d7478f1d3dd977e0c1c6e923e80cfe623f0bccf1da2dba006bddacfe6e036d461f2ed5d21c551fba2449b0bc877379f28cd042268a8a293833d60b629de61a87dc54633ac3fce87b5840788282b4f98a50807ed098c0e8d314a43a4fd104863db751bd286f6203c53117c534b9a0475b5e3cc68b66998662bdf5333a4d0e80b3da3df7d457ea6a829d9278e9dc913c4d52bb1f87360441d4615c04926d9e7aeb7fd6f45b6b58e420ace9ed5294aadda6fd201506310b735a7baf49d1a98aea70ed3f756c437e5d88ae24d8ec620e739983707046fbca6cbb1b8407a589719bdb14a9fa757b0fee511d7b50deca49350e9c4e7b52a2f5a3caf1fa4c44299a8980366e2a6988b3d2b8544b2fd8761877c93940dca94dbf6fafd62d0abed1d01a6e12dbc37e92387de675905f22932dd1976730bf824de286fa905dbe676b60726ce95099907bfa9e55145ffd3decf95835a9d68d351b2c2fc951611de4a240b83d67d42a26df199901a670838ce3ab0c2f8bcd28719539ad92c569474d32488101b56a4a9cf58ea2fe9d9cfc884ef0b62a5f3e28603b4411243472a5b9bc5192f88c016b039d6b08b38f03093c4569a381adfca98dae3e132540c4c5e8e99e7865b7bae01ed06353ced5e30f32ebbf3aabe3af970033b8978b0fdb3eb5d85f8aa1faf3e47d4d912647826c5ba81b95da8895dc361aa158f6fed39d2ecda0e36e3d7e68315baf5edb2bebbcf2d4e28bc75993691417eeb48ed796d6001a3eff970b99081382d5c9f4d2185ac98ad5cd6d4ba867505e61f4fc411f6a920964ef6a771d2ee9b9f43d47dad5d7888c5e24c1ab35020bd740fdfe8bba1740e6b7e77e2f7d39f4ca0e920df08f3b8405f0a1a2f74833c50454991904de536ef28f50f12b5d60a045c6b4f3d1dc7526cec1ac3a0ed2f791d4271ec6d6d5a8fe9a6e6878927ec278ec5c23bf6964adf4286eb6dbe2790ad203c4853e1c57ca52da41cca75bd36a2418f0b203453d06f97f8831f9d7a17d4546b857c610c4091e5d416c7315e9da84efea9e3b341e87c41a4614addc5c1a7b1b828e6588a387ffc8479680595e8a37a2738679a2e8c1f0c3777e8a6c5d946f626723b956db348d9b5ecdfcb59808d557954b3c3dfb6fc36228b2981a7b0a4f0e4d42840f561f0052fb71a881f4a2dccc6e4f4519bc6f485c529afe06c598818caf970839d4221bb227e7a5f7195f6b938a13b653d7eaf0b7fe2fb1b77059e241897d42e41e9af955d50b10b5d30cb2573dd2808e943d75022061e8595b1ce3ed274daf842f9add922e3418245f6c870ccec573db35d2e6eb94c69d21690bf893188bed11cb8292976826f342b6a431b21d5d86e48ddb5636864dfb3328fbdbba519d44c8ae84542cc70a33ae41ec1a3ad45b5663adc1916c4ef796d254123ac034fcc270a7c341816bd90c3adec81d18868b42f58badc44432", 0x1000}, {&(0x7f0000000ac0)="2d560717e6e186abb967ada9d961f0e442263db340c6bbf2", 0x18}], 0x6, &(0x7f00000039c0)=[{0x40, 0x104, 0x6, "0909102dd74b183a249bc2b353930e5f889c9f738a077cb2c81ce7d5f93e5e2bbd7e25644e19b7eb3ce940c0d77d6ff6"}, {0x108, 0x117, 0x1, "fe3def4038612e765a4819ea4c2ad7042eb6953a4ac083dcb80b7e505a3ee724cf224356b81c246b134b39139ff92646d9f18ad8058745d6d72b6f27845bb7273bb7f0df4e266a43c80acd502ef276b99dd212f61a5a5dd60626267c7d4c4f8883390b1e3b767ba9854c37616438fccee68778795993c840a26e456f203ed55216d9011805a6d3c042599b312b0bab5b00d4c6891495cdfe97e4f466271d9cebaf3747bb8645b1cbe29ec4a799bfde880511da46eb987b1f0798e5cbe8c0612c320a5ac786bf6b846b978ccbb6985748a7e4ceaf62bae920f3a84c62f5d2dc546bb07090afad897a0a2b04fb2d8f7b7b10b2682f57c8"}, {0x1010, 0x112, 0xfffffffffffff000, "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"}, {0x1010, 0x11f, 0x1, "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"}, {0x70, 0x29, 0x8001, "dd525f5b2d3a0f9beefce6098dd496c43bc7e44d4384bc14459ef87c181cb8de4b8d47269b3fd242320af8e27aefaba27b7a1b044448f552da95549d1165c54f3fd73c65dfc3bb6fc2dcb1415eca3f1e628d4c591a913c1c09d67f5a5541"}, {0x100, 0x105, 0x0, "8e6056100c16199328dcd59f9bc0235d10ed536742b2bd14c9c44664b2a145906d61d174b07bcbeae1d255f8a92dc8713d3d73435c191c233610e1250106bc764707c540be5468378bba7249c7865ad115ddbd0069fe6bcf494be033930c58d22b11af9a69f24e979916c9957da16cec3bbc23a56f9a413f8d1e9109fbed03bf9a92ee2ae8a3d74a32d2493c3390920ff4e29dd165888fb954fa5e39d22457a1582541cd72db78e93dbeaeecd242654437a633499e02c617fdf1424f4fede98ac073256bb15e2ee7a6f16158be19ca74ba5e53563c39212f180eb0ddf07a4bef09e98e3270207400b9c61d"}, {0xb8, 0x104, 0x7, "275ced99f6ec2972ab989a4f5b90d2ce144da66955ff02347f4b28d433766a7a366ea88a4b4c320b39af562001b69ab98ab823ca71c97732bee5e5cf0411da66ef02ceea974ee28022aa8abec64ef2fb7d0bf77384df2a3ab9f31513d96acb163173261b29e75b3faa4016f39970a16713a9c908a479310da7b89933bf5df525138aa779d77a0ca6a8fb00386a6f3b3a6ea63235fa8ca014dc75a64be6f09d74c9a6ba"}, {0x98, 0x10d, 0x0, "0b90b19dc417d00274b7f13c44fef4e265419df61171597f5cd2c67666d064c34a3e8513470202304ad5a657130af5e0c45d4cbfa1004f1bba308f97d415bb435df9fdb743dd8f2832f6c13d42b5ea80c668c7e092cc4dae0f55b519a79ea6510b76161488749f72560b31c86b28b1b7073adb5f163be9e63c97320c2c62c6187f"}], 0x2428, 0x80}, 0x2}, {{&(0x7f0000000e40)=@pppol2tpv3={0x18, 0x1, {0x0, r8, {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, 0x2, 0x3}}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000ec0)="19a1fee23587c2e02f13dea4732f7ad82d4a064ff7ff86f6ffce9d27e0edd8e31ad0be93cceadee3aeed48079590d1a6a1df75884b2c72b5d4706d3e76deb397538aca6846dbb1a21b99ebee52ac315bc931dd45847ed823d41366b35ec8911b9c30e6194e54eb84499cd120f314dc07e96008f29625684418d2bca0806ee3f4ad89428f4edbdfa14516ca9073b3873462784b81ee036cc2286724af26fbca6240d396e422913094629a5642a60735", 0xaf}, {&(0x7f0000001180)="0bb58b6dbe41885c0ce2ddf73fc0b5174e8b9c64985a81b554b3712b2da58dbd452290d79eeff026f7d68176d32c2d1eb769cbff317b1742aac6caa5748366926af052ada4a2206c6174f58b5cc69ac4a1e1134b512703529acb5b5cf6e41efdc00a53e238bc422c58e7121adeaab146d5d5529b2a0ac0a656ee9edd7ba6629c3d9b2f5c441d9cc993bd4c1870f7c0a86fc90dd62eac94605e2e338c68d930a24bfe4e4770166b9531adc4581ec362ceef4d072ddfbd8363eb06ff23", 0xbc}], 0x2, 0x0, 0x0, 0x4000000}, 0x2}, {{&(0x7f0000001280)=@ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000001300)="a2cb1040180b2710bba8519bdfbe3d1beff0bc16ec62b180102750db1c42571049522657c6e82f40d7988f7a10d50b9b13cd7492567cbc8444fe47ab158b115d3435a858c0d02d1b7c5307b8197ed6720af06e8cab3578ce77ec478e0d60dcc06736c405e13b347a738a700bad", 0x6d}, {&(0x7f0000001380)="c2c16ebecc2d2b8c336c541532e01900a862be49be12b2806ba2704e0e6313371f7d19922c0351d3963855fa5ae6a647eb1445e9a4f27067e80bc340ebfac656efc2f26a976713d4efd3ee9c5235242210e897019c0d42cc6f8bd8aa08c6cff0c12ee7ac11602a52499618f3d1a02d34d50951457f74d521f4d3f6f0acd53e4506b4d5bc510113e7edfbe44a7582fa057671630f8085ea65214e8fdb", 0x9c}, {&(0x7f0000001440)="19240cdf579f81ad", 0x8}, {&(0x7f0000001480)="05c352fcdc65480419cd920b5502dab45db16cf082b962c6d5e86d273abd7947f8d1f234bf612a235f87981610647670d0604be7a7b3082137c5794d7b1461509bff710090faa9cdb251ab3585563ba82b56ab4ec0d98e4ee02d295e2c2a90612f45d5ca43a292022df255d158236fd19468a61021e76b86beeaea1a56a0f0a9bf", 0x81}, {&(0x7f0000001540)="889c9a0077d07affcfe7df757c003bc5133f7c767ee5da046be07a73e63a1439e1f854c6c6876bda34155d32b849723980064388d1c7b20804621002ce2836259d4beada1a41e9323a46ddbc86482db515b3dcf4106c91", 0x57}, {&(0x7f00000015c0)="9e6686efff9e843dc68227da6f10747b1340a0f062935e818811b25649940d2da33dd202d5190e384b9916ef52b874b8feafe1e3eadff3f547dab38f752f39283c03c733d320143be0d0c08fa5926bd01240bd9c472875b79af7ecbda3c119d4f9e0f5f3590a50de77809275c302d6b966873b710b43510ce04e38c5bd", 0x7d}], 0x6, &(0x7f00000016c0)=ANY=[@ANYBLOB="b00000000000000017010000ffffffff98325381241459d139c8d450db19ad2e16fb66e828d5dff41592b05126acf9c8bbf39242db26ce0c2513330fa21b717282c0e88b7b1c5744f3ec835421a05937e51c9f0a4d1bafee59c585448fd8f08888f62aa66141e965199e876b601f43313485fcc61614916d70998434005f21f9985b7b5e3d98b052be9e270ffc5a24df24b27af06f0ece6ffbc2de6f378db6179c617b0be326148fc4512fb1b6ac0000"], 0xb0, 0x4}, 0x1}], 0x3, 0x20000010) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r6}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r4, 0x28, &(0x7f0000001900)}, 0xfffffffffffffed7) sendmsg(r10, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r10, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000080000000000200000000000850000001b000000000000000000000085000000120000000000000000000000ff06ffff7c250000000000000000000018000000030000000000000000000000bf01feff600800000000000000308e34400e573c76690b9713c30a4b00000000d0f7fffffcffffff0000000000000000637f5e00", @ANYRES32=r9, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:03 executing program 6: r0 = memfd_create(&(0x7f0000000000)="6574e83000", 0x0) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') sendfile(r0, r1, &(0x7f0000000200), 0xcff) 2018/03/30 22:21:03 executing program 4 (fault-call:13 fault-nth:71): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:21:03 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x11, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1126.684358] xprt_adjust_timeout: rq_timeout = 0! [ 1126.689345] xprt_adjust_timeout: rq_timeout = 0! [ 1126.701853] xprt_adjust_timeout: rq_timeout = 0! [ 1126.702583] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1126.716109] xprt_adjust_timeout: rq_timeout = 0! [ 1126.750009] REISERFS (device loop7): using ordered data mode [ 1126.751367] FAULT_INJECTION: forcing a failure. [ 1126.751367] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.756186] reiserfs: using flush barriers [ 1126.767346] CPU: 1 PID: 22633 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1126.767357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.788089] Call Trace: [ 1126.790677] dump_stack+0x194/0x24d [ 1126.793244] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1126.794301] ? arch_local_irq_restore+0x53/0x53 [ 1126.794326] should_fail+0x8c0/0xa40 [ 1126.794342] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1126.794357] ? perf_trace_lock+0x900/0x900 [ 1126.794372] ? __lock_acquire+0x664/0x3e00 [ 1126.825009] ? find_held_lock+0x35/0x1d0 [ 1126.829060] ? __lock_is_held+0xb6/0x140 [ 1126.833108] ? check_same_owner+0x320/0x320 [ 1126.837404] ? __d_lookup+0x4f4/0x830 [ 1126.841186] ? rcu_note_context_switch+0x710/0x710 [ 1126.846098] should_failslab+0xec/0x120 [ 1126.850050] kmem_cache_alloc+0x47/0x760 [ 1126.854091] __d_alloc+0xc1/0xbd0 [ 1126.857524] ? shrink_dcache_for_umount+0x290/0x290 [ 1126.862517] ? d_alloc_parallel+0x1b40/0x1b40 [ 1126.866990] ? lock_release+0xa40/0xa40 [ 1126.870945] ? mark_held_locks+0xaf/0x100 [ 1126.875071] ? d_lookup+0x133/0x2e0 [ 1126.878685] ? d_lookup+0x1d5/0x2e0 [ 1126.882291] d_alloc+0x8e/0x340 [ 1126.885547] ? __d_alloc+0xbd0/0xbd0 [ 1126.889235] ? full_name_hash+0x9b/0xe0 [ 1126.893193] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1126.898446] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1126.902666] rpc_populate.constprop.15+0xa3/0x340 [ 1126.907491] rpc_fill_super+0x379/0xae0 [ 1126.911446] ? cap_capable+0x1b5/0x230 [ 1126.915310] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1126.920480] ? security_capable+0x8e/0xc0 [ 1126.924606] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1126.929775] ? ns_capable_common+0xcf/0x160 [ 1126.934077] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1126.939243] mount_ns+0xc4/0x190 [ 1126.942588] rpc_mount+0x9e/0xd0 [ 1126.945932] mount_fs+0x66/0x2d0 [ 1126.949279] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1126.953851] ? may_umount+0xa0/0xa0 [ 1126.957456] ? _raw_read_unlock+0x22/0x30 [ 1126.961580] ? __get_fs_type+0x8a/0xc0 [ 1126.965446] do_mount+0xea4/0x2bb0 [ 1126.968968] ? copy_mount_string+0x40/0x40 [ 1126.973180] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1126.978175] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1126.982911] ? retint_kernel+0x10/0x10 [ 1126.986777] ? copy_mount_options+0x18b/0x2e0 [ 1126.991252] ? copy_mount_options+0x18e/0x2e0 [ 1126.995725] ? copy_mount_options+0x1f7/0x2e0 [ 1127.000197] SyS_mount+0xab/0x120 [ 1127.003624] ? copy_mnt_ns+0xb30/0xb30 [ 1127.007489] do_syscall_64+0x281/0x940 [ 1127.011354] ? vmalloc_sync_all+0x30/0x30 [ 1127.015480] ? _raw_spin_unlock_irq+0x27/0x70 [ 1127.019950] ? finish_task_switch+0x1c1/0x7e0 [ 1127.024423] ? syscall_return_slowpath+0x550/0x550 [ 1127.029331] ? syscall_return_slowpath+0x2ac/0x550 [ 1127.034235] ? prepare_exit_to_usermode+0x350/0x350 [ 1127.039231] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1127.044573] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1127.049397] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1127.054561] RIP: 0033:0x454e79 [ 1127.057727] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1127.065415] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1127.072661] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1127.079908] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1127.087156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1127.094403] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000047 2018/03/30 22:21:04 executing program 6: r0 = socket$inet(0x15, 0x5, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000040)={&(0x7f0000001fc0)=ANY=[], 0x0, &(0x7f0000000200), 0x0, &(0x7f0000001640)=""/183, 0xb7}, 0x0) r2 = accept4(r1, &(0x7f0000000340)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, &(0x7f00000003c0)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000400), &(0x7f0000000440)=0x4) readv(r1, &(0x7f0000001b80)=[{&(0x7f0000003f00)=""/4096, 0x1000}], 0x1) recvmsg(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001600), 0x0, &(0x7f0000001780)=""/254, 0xfe}, 0x0) recvmsg(r1, &(0x7f000001cfc8)={&(0x7f0000000080)=@l2, 0x80, &(0x7f0000022fe0), 0x0, 0x0, 0xfffffffffffffd86}, 0x0) recvfrom(r1, &(0x7f0000000000)=""/55, 0x108, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0xfffd}, 0xc, &(0x7f0000000600)={&(0x7f0000001440)=ANY=[@ANYBLOB="e95000000000ce4e06000000000000f5000000007577d1fb4fa808"], 0x1}, 0x1}, 0xc0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000100)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000001c0)={0x7, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {0x0}, {}]}) socket(0xa, 0x3, 0x29cf78aa) ioctl$DRM_IOCTL_DMA(r3, 0xc0406429, &(0x7f0000000300)={r4, 0x6, &(0x7f0000000200)=[0x4, 0x8, 0x8, 0xef26, 0x3, 0x80000000], &(0x7f0000000240)=[0xffffffffffffff99, 0x1, 0x9, 0xea5], 0x13, 0x5, 0x1, &(0x7f0000000280)=[0x832, 0x3ff, 0x0, 0x0, 0x80000001], &(0x7f00000002c0)=[0x200]}) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r5 = accept4$bt_l2cap(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) readv(r6, &(0x7f00000013c0)=[{&(0x7f0000000140)=""/201, 0xc9}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/85, 0x55}, {&(0x7f00000012c0)=""/104, 0x68}, {&(0x7f0000001340)=""/44, 0x2c}, {&(0x7f0000001380)=""/41, 0x29}, {&(0x7f00000014c0)=""/195, 0xc3}], 0x7) connect$bt_l2cap(r5, &(0x7f0000000100)={0x1f, 0xa7, {0xeee2, 0x6, 0x1, 0x4, 0xffffffffffff0000, 0x9}, 0x7cfb, 0x8}, 0xe) connect$inet(r0, &(0x7f0000024ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000000)=[{0x10, 0x114, 0xc}], 0x10}, 0x0) 2018/03/30 22:21:04 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x11, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1127.102769] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 1127.127078] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:04 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00'}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:04 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:04 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) [ 1127.146679] netlink: 'syz-executor6': attribute type 29 has an invalid length. [ 1127.154189] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. [ 1127.177436] xprt_adjust_timeout: rq_timeout = 0! [ 1127.218346] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 1127.229957] netlink: 'syz-executor6': attribute type 29 has an invalid length. [ 1127.237559] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. 2018/03/30 22:21:04 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000008c0)='./file1/file0\x00', 0x1) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r6, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000540)={r6}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000880)={r9}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r4, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r11, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r11, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r7) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r12}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r10}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r12}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) unlinkat(r3, &(0x7f0000000400)='./file1\x00', 0x200) 2018/03/30 22:21:04 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x11, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1127.284181] xprt_adjust_timeout: rq_timeout = 0! [ 1127.290266] xprt_adjust_timeout: rq_timeout = 0! [ 1127.301349] netlink: 'syz-executor6': attribute type 29 has an invalid length. [ 1127.308821] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. [ 1127.340835] xprt_adjust_timeout: rq_timeout = 0! [ 1127.353095] netlink: 'syz-executor6': attribute type 29 has an invalid length. [ 1127.360701] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. 2018/03/30 22:21:04 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1127.397719] netlink: 'syz-executor6': attribute type 29 has an invalid length. [ 1127.405233] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. [ 1127.418542] netlink: 'syz-executor6': attribute type 29 has an invalid length. [ 1127.426007] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. [ 1127.472461] netlink: 'syz-executor6': attribute type 29 has an invalid length. [ 1127.479926] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. [ 1127.486075] xprt_adjust_timeout: rq_timeout = 0! [ 1127.494291] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1127.509131] REISERFS (device loop7): using ordered data mode [ 1127.515085] reiserfs: using flush barriers [ 1127.523133] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1127.532150] netlink: 'syz-executor6': attribute type 29 has an invalid length. [ 1127.539565] netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. [ 1127.540242] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space 2018/03/30 22:21:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:21:04 executing program 4 (fault-call:13 fault-nth:72): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:21:04 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c40)=""/231, 0xe7}], 0x1, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:04 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0x0, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:04 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:04 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:21:04 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x3, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x0, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x8000000045, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0xffffe, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000400)) close(r3) close(r0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x3d2, &(0x7f0000000dc0)=[{&(0x7f0000000400)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x40000000) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r6, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x108, &(0x7f00000008c0), 0x0, &(0x7f00000008c0)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000540)={r6}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r6}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x0, 0x5, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r4, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r10, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000440)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000000a00)=""/211, 0xd3}], 0x1, 0x0, 0xfffffffffffffc9c, 0x6}, 0xc0) close(r7) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000001840)='syzkaller\x00', 0x3c, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000080000000000000000000000850000001b000000000000000000000085000000120000000000000000000000ff06ffff7c250000000000000000000018000000030000000000000000000000bf01feff080000000000000000000000d0f7fffffcffffff0000000000000000637f5e00ffffffff0000000000000000181a0000", @ANYRES32=r9, @ANYBLOB='\x00'], &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1127.659079] xprt_adjust_timeout: rq_timeout = 0! [ 1127.662551] xprt_adjust_timeout: rq_timeout = 0! [ 1127.666948] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1127.680964] xprt_adjust_timeout: rq_timeout = 0! [ 1127.694948] REISERFS (device loop7): using ordered data mode [ 1127.700900] reiserfs: using flush barriers [ 1127.705681] FAULT_INJECTION: forcing a failure. [ 1127.705681] name failslab, interval 1, probability 0, space 0, times 0 [ 1127.717150] CPU: 0 PID: 22694 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1127.724342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1127.733693] Call Trace: [ 1127.736273] dump_stack+0x194/0x24d [ 1127.739889] ? arch_local_irq_restore+0x53/0x53 [ 1127.744561] should_fail+0x8c0/0xa40 [ 1127.748264] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1127.753350] ? trace_event_raw_event_lock+0x340/0x340 [ 1127.758537] ? find_held_lock+0x35/0x1d0 [ 1127.762587] ? __lock_is_held+0xb6/0x140 [ 1127.766641] ? check_same_owner+0x320/0x320 [ 1127.770943] ? d_alloc+0x269/0x340 [ 1127.774469] ? rcu_note_context_switch+0x710/0x710 [ 1127.779390] should_failslab+0xec/0x120 [ 1127.783380] kmem_cache_alloc+0x47/0x760 [ 1127.787433] ? d_drop+0x51/0x60 [ 1127.790699] ? rpc_i_callback+0x30/0x30 [ 1127.794657] rpc_alloc_inode+0x1a/0x20 [ 1127.798527] alloc_inode+0x65/0x180 [ 1127.802138] new_inode_pseudo+0x69/0x190 [ 1127.806183] ? prune_icache_sb+0x1a0/0x1a0 [ 1127.810405] ? do_raw_spin_trylock+0x190/0x190 [ 1127.814968] ? d_add+0xa70/0xa70 [ 1127.818342] new_inode+0x1c/0x40 [ 1127.821692] rpc_get_inode+0x20/0x1e0 [ 1127.825479] __rpc_create_common+0x5d/0x1d0 [ 1127.829787] rpc_populate.constprop.15+0x1ad/0x340 [ 1127.834721] rpc_fill_super+0x379/0xae0 [ 1127.838682] ? cap_capable+0x1b5/0x230 [ 1127.842551] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1127.847729] ? security_capable+0x8e/0xc0 [ 1127.851861] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1127.857034] ? ns_capable_common+0xcf/0x160 [ 1127.861342] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1127.866512] mount_ns+0xc4/0x190 [ 1127.869865] rpc_mount+0x9e/0xd0 [ 1127.873217] mount_fs+0x66/0x2d0 [ 1127.876571] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1127.881135] ? may_umount+0xa0/0xa0 [ 1127.884744] ? _raw_read_unlock+0x22/0x30 [ 1127.888876] ? __get_fs_type+0x8a/0xc0 [ 1127.892751] do_mount+0xea4/0x2bb0 [ 1127.896279] ? copy_mount_string+0x40/0x40 [ 1127.900497] ? rcu_pm_notify+0xc0/0xc0 [ 1127.904373] ? copy_mount_options+0x5f/0x2e0 [ 1127.908761] ? rcu_read_lock_sched_held+0x108/0x120 [ 1127.913761] ? kmem_cache_alloc_trace+0x459/0x740 [ 1127.918587] ? kasan_check_write+0x14/0x20 [ 1127.922807] ? copy_mount_options+0x1f7/0x2e0 [ 1127.927288] SyS_mount+0xab/0x120 [ 1127.930723] ? copy_mnt_ns+0xb30/0xb30 [ 1127.934595] do_syscall_64+0x281/0x940 [ 1127.938462] ? vmalloc_sync_all+0x30/0x30 [ 1127.942590] ? _raw_spin_unlock_irq+0x27/0x70 [ 1127.947067] ? finish_task_switch+0x1c1/0x7e0 [ 1127.951545] ? syscall_return_slowpath+0x550/0x550 [ 1127.956456] ? syscall_return_slowpath+0x2ac/0x550 [ 1127.961369] ? prepare_exit_to_usermode+0x350/0x350 [ 1127.966370] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1127.971717] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1127.976548] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1127.981716] RIP: 0033:0x454e79 [ 1127.984886] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1127.992579] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1127.999828] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/03/30 22:21:05 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0x0, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1128.007076] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1128.014326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1128.021576] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000048 [ 1128.028945] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfsd4_cb [ 1128.031168] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1128.084638] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 1128.107825] xprt_adjust_timeout: rq_timeout = 0! [ 1128.126533] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 22:21:05 executing program 6: mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000da7ff0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) poll(&(0x7f0000000500)=[{r0, 0x2000}, {r0, 0x4002}, {r0, 0x200}], 0x3, 0x2) close(r0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000440)={'vcan0\x00', 0x80000000}) r1 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000389000)) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) socketpair(0x9, 0x0, 0x3, &(0x7f0000000480)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000004c0)=0x2, 0x4) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f00000003c0)={{0xa, 0x4e21, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, {0xa, 0x4e24, 0x6, @empty, 0x1}, 0xffffffff80000001, [0x3, 0xcffc, 0x8, 0x9, 0x10000, 0x4, 0x7, 0x100000000]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000180)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000001c0)={0x7fff, 0x0, 0x2, 0x8}) ioctl$DRM_IOCTL_AGP_BIND(r5, 0x40106436, &(0x7f0000000200)={r6, 0x8}) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000280)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', r4}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf02000)=nil, 0xf02000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000002c0)={'security\x00'}, &(0x7f0000000340)=0x54) getsockname(r1, &(0x7f0000000580)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, &(0x7f0000000600)=0x80) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f0000000240)=0x3) recvfrom$packet(r8, &(0x7f0000000640)=""/206, 0xce, 0x0, &(0x7f0000000740)={0x11, 0x7, r7, 0x1, 0x2, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x16}}, 0x14) 2018/03/30 22:21:05 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:05 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0x0, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:05 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c40)=""/231, 0xe7}], 0x1, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:05 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a0") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:21:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:21:05 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8010, r7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:05 executing program 4 (fault-call:13 fault-nth:73): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 1128.664098] xprt_adjust_timeout: rq_timeout = 0! [ 1128.669784] xprt_adjust_timeout: rq_timeout = 0! [ 1128.671160] xprt_adjust_timeout: rq_timeout = 0! [ 1128.675360] xprt_adjust_timeout: rq_timeout = 0! [ 1128.693979] FAULT_INJECTION: forcing a failure. [ 1128.693979] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.705222] CPU: 1 PID: 22742 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1128.712401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.721744] Call Trace: [ 1128.724336] dump_stack+0x194/0x24d [ 1128.727970] ? arch_local_irq_restore+0x53/0x53 [ 1128.732650] should_fail+0x8c0/0xa40 [ 1128.736367] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1128.741463] ? perf_trace_lock+0x900/0x900 [ 1128.745683] ? __lock_acquire+0x664/0x3e00 [ 1128.749901] ? find_held_lock+0x35/0x1d0 [ 1128.753943] ? __lock_is_held+0xb6/0x140 [ 1128.757991] ? check_same_owner+0x320/0x320 [ 1128.762294] ? __d_lookup+0x4f4/0x830 [ 1128.766073] ? rcu_note_context_switch+0x710/0x710 [ 1128.770984] should_failslab+0xec/0x120 [ 1128.774938] kmem_cache_alloc+0x47/0x760 [ 1128.778983] __d_alloc+0xc1/0xbd0 [ 1128.782416] ? shrink_dcache_for_umount+0x290/0x290 [ 1128.787409] ? d_alloc_parallel+0x1b40/0x1b40 [ 1128.791887] ? lock_release+0xa40/0xa40 [ 1128.795843] ? mark_held_locks+0xaf/0x100 [ 1128.799968] ? d_lookup+0x133/0x2e0 [ 1128.803576] ? d_lookup+0x1d5/0x2e0 [ 1128.807184] d_alloc+0x8e/0x340 [ 1128.810441] ? __d_alloc+0xbd0/0xbd0 [ 1128.814133] ? full_name_hash+0x9b/0xe0 [ 1128.818093] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1128.823348] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1128.827564] rpc_populate.constprop.15+0xa3/0x340 [ 1128.832388] rpc_fill_super+0x379/0xae0 [ 1128.836340] ? cap_capable+0x1b5/0x230 [ 1128.840204] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1128.845374] ? security_capable+0x8e/0xc0 [ 1128.849499] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1128.854664] ? ns_capable_common+0xcf/0x160 [ 1128.858963] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1128.864131] mount_ns+0xc4/0x190 [ 1128.867476] rpc_mount+0x9e/0xd0 [ 1128.870821] mount_fs+0x66/0x2d0 [ 1128.874168] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1128.878727] ? may_umount+0xa0/0xa0 [ 1128.882333] ? _raw_read_unlock+0x22/0x30 [ 1128.886456] ? __get_fs_type+0x8a/0xc0 [ 1128.890326] do_mount+0xea4/0x2bb0 [ 1128.893846] ? copy_mount_string+0x40/0x40 [ 1128.898060] ? rcu_pm_notify+0xc0/0xc0 [ 1128.901928] ? copy_mount_options+0x5f/0x2e0 [ 1128.906315] ? rcu_read_lock_sched_held+0x108/0x120 [ 1128.911307] ? kmem_cache_alloc_trace+0x459/0x740 [ 1128.916130] ? kasan_check_write+0x14/0x20 [ 1128.920343] ? copy_mount_options+0x1f7/0x2e0 [ 1128.924817] SyS_mount+0xab/0x120 [ 1128.928245] ? copy_mnt_ns+0xb30/0xb30 [ 1128.932110] do_syscall_64+0x281/0x940 [ 1128.935976] ? vmalloc_sync_all+0x30/0x30 [ 1128.940100] ? _raw_spin_unlock_irq+0x27/0x70 [ 1128.944573] ? finish_task_switch+0x1c1/0x7e0 [ 1128.949044] ? syscall_return_slowpath+0x550/0x550 [ 1128.953948] ? syscall_return_slowpath+0x2ac/0x550 [ 1128.958856] ? prepare_exit_to_usermode+0x350/0x350 [ 1128.963851] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1128.969196] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1128.974026] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1128.979192] RIP: 0033:0x454e79 [ 1128.982357] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1128.990044] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1128.997290] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1129.004537] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1129.011781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1129.019028] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000049 [ 1129.055415] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 1129.055598] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1129.087158] xprt_adjust_timeout: rq_timeout = 0! [ 1129.106172] REISERFS (device loop7): using ordered data mode [ 1129.112173] reiserfs: using flush barriers [ 1129.127930] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1129.146581] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space 2018/03/30 22:21:06 executing program 6: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000925fe4)={0xa, 0x4e23}, 0x1c) listen(r0, 0xf435) accept4(r0, &(0x7f0000000180)=@hci, &(0x7f0000000140)=0xffffffffffffff9d, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000867ff0)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) 2018/03/30 22:21:06 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:06 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c40)=""/231, 0xe7}], 0x1, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:06 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:06 executing program 4 (fault-call:13 fault-nth:74): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:21:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:21:06 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) ioctl$KVM_SET_FPU(r6, 0x41a0ae8d, &(0x7f0000000940)={[], 0x8, 0x115, 0x10000, 0x0, 0x6, 0x0, 0x10f000, [], 0x7}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000e40)=ANY=[@ANYBLOB="18000000080000000000000000000000850000001b000000000000000000000085000000120000000000000000000000ff06ffff7c250000000000000000000018000000030000000000000000000000bf01feff080000000000000000000000d0f7fffffcffffff0000000000000000637f5e00ffffffff0000000000000000181a0000", @ANYRES32=r8, @ANYBLOB="000000000000000095000000000089910000"], &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:06 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a0") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) [ 1129.616355] xprt_adjust_timeout: rq_timeout = 0! [ 1129.629180] xprt_adjust_timeout: rq_timeout = 0! [ 1129.635397] xprt_adjust_timeout: rq_timeout = 0! [ 1129.640394] xprt_adjust_timeout: rq_timeout = 0! [ 1129.651424] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1129.671197] FAULT_INJECTION: forcing a failure. [ 1129.671197] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.682492] CPU: 1 PID: 22779 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1129.689678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.699026] Call Trace: [ 1129.701619] dump_stack+0x194/0x24d [ 1129.705251] ? arch_local_irq_restore+0x53/0x53 [ 1129.709929] should_fail+0x8c0/0xa40 [ 1129.713646] ? perf_trace_lock_acquire+0xe3/0x980 [ 1129.718494] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1129.723595] ? trace_event_raw_event_lock+0x340/0x340 [ 1129.728779] ? perf_trace_lock+0x900/0x900 [ 1129.733014] ? mark_held_locks+0xaf/0x100 [ 1129.737166] ? __raw_spin_lock_init+0x1c/0x100 [ 1129.741752] ? find_held_lock+0x35/0x1d0 [ 1129.745816] ? __lock_is_held+0xb6/0x140 [ 1129.749891] ? check_same_owner+0x320/0x320 [ 1129.754208] ? d_alloc+0x269/0x340 [ 1129.757746] ? rcu_note_context_switch+0x710/0x710 [ 1129.762322] REISERFS (device loop7): using ordered data mode [ 1129.762678] should_failslab+0xec/0x120 [ 1129.762690] kmem_cache_alloc+0x47/0x760 [ 1129.768609] reiserfs: using flush barriers [ 1129.772434] ? d_drop+0x51/0x60 [ 1129.772448] ? rpc_i_callback+0x30/0x30 [ 1129.772460] rpc_alloc_inode+0x1a/0x20 [ 1129.772470] alloc_inode+0x65/0x180 [ 1129.772481] new_inode_pseudo+0x69/0x190 [ 1129.799420] ? prune_icache_sb+0x1a0/0x1a0 [ 1129.803636] ? do_raw_spin_trylock+0x190/0x190 [ 1129.808197] ? d_add+0xa70/0xa70 [ 1129.811544] new_inode+0x1c/0x40 [ 1129.814893] rpc_get_inode+0x20/0x1e0 [ 1129.818673] __rpc_create_common+0x5d/0x1d0 [ 1129.822975] rpc_populate.constprop.15+0x1ad/0x340 [ 1129.827887] rpc_fill_super+0x379/0xae0 [ 1129.831843] ? cap_capable+0x1b5/0x230 [ 1129.835707] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1129.840878] ? security_capable+0x8e/0xc0 [ 1129.845006] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1129.850179] ? ns_capable_common+0xcf/0x160 [ 1129.854480] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1129.859649] mount_ns+0xc4/0x190 [ 1129.862997] rpc_mount+0x9e/0xd0 [ 1129.866345] mount_fs+0x66/0x2d0 [ 1129.869691] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1129.874253] ? may_umount+0xa0/0xa0 [ 1129.877856] ? _raw_read_unlock+0x22/0x30 [ 1129.881978] ? __get_fs_type+0x8a/0xc0 [ 1129.885848] do_mount+0xea4/0x2bb0 [ 1129.889368] ? copy_mount_string+0x40/0x40 [ 1129.893579] ? rcu_pm_notify+0xc0/0xc0 [ 1129.897449] ? copy_mount_options+0x5f/0x2e0 [ 1129.901834] ? rcu_read_lock_sched_held+0x108/0x120 [ 1129.906829] ? kmem_cache_alloc_trace+0x459/0x740 [ 1129.911649] ? kasan_check_write+0x14/0x20 [ 1129.915864] ? copy_mount_options+0x1f7/0x2e0 [ 1129.920335] SyS_mount+0xab/0x120 [ 1129.923766] ? copy_mnt_ns+0xb30/0xb30 [ 1129.927632] do_syscall_64+0x281/0x940 [ 1129.931497] ? vmalloc_sync_all+0x30/0x30 [ 1129.935622] ? _raw_spin_unlock_irq+0x27/0x70 [ 1129.940097] ? finish_task_switch+0x1c1/0x7e0 [ 1129.944568] ? syscall_return_slowpath+0x550/0x550 [ 1129.949476] ? syscall_return_slowpath+0x2ac/0x550 [ 1129.954385] ? prepare_exit_to_usermode+0x350/0x350 [ 1129.959382] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1129.964723] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1129.969551] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1129.974717] RIP: 0033:0x454e79 [ 1129.977883] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1129.985570] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1129.992817] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1130.000066] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1130.007312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1130.014557] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000004a 2018/03/30 22:21:06 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}], 0x1, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:06 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1130.022096] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry cache [ 1130.043669] xprt_adjust_timeout: rq_timeout = 0! [ 1130.055251] xprt_adjust_timeout: rq_timeout = 0! [ 1130.063177] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header 2018/03/30 22:21:07 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:07 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1130.069664] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 1130.074946] xprt_adjust_timeout: rq_timeout = 0! [ 1130.134182] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space 2018/03/30 22:21:07 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) fcntl$notify(r6, 0x402, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1130.178770] xprt_adjust_timeout: rq_timeout = 0! [ 1130.195127] xprt_adjust_timeout: rq_timeout = 0! [ 1130.270571] xprt_adjust_timeout: rq_timeout = 0! [ 1130.319902] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:07 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}], 0x1, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:07 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a0") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:21:07 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:07 executing program 4 (fault-call:13 fault-nth:75): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:21:07 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0xfffffffeffffffff, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x80000000, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000400)='/dev/admmidi#\x00', 0x6, 0x101101) getresuid(&(0x7f00000008c0)=0x0, &(0x7f0000000940), &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000009c0)={0x0, 0x0, 0x0}, &(0x7f0000000a00)=0xc) fchownat(r3, &(0x7f0000000880)='./file1\x00', r4, r5, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r8, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000000540)={r8}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r8}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r6, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r12, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r12, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r9) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r13}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r11}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r13}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:07 executing program 6: unshare(0x8000000) r0 = mq_open(&(0x7f0000000000)='^procwlan1\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000664fc0)={0x0, 0x3, 0x2}) mq_notify(r0, &(0x7f0000000180)={0x0, 0x28, 0x1}) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) r2 = dup(r1) getegid() ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000040)) setsockopt$inet6_dccp_int(r2, 0x21, 0x1f, &(0x7f0000000080)=0x2, 0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="5a000000671f9606f68344f930091db7caa8932f9d439e7a2427740e8c34615d883c046dd0c00300000060ad3559321b3558c9d3bbbcae3b5511fbec498b892bb7fd7be9252312d0d5ad72e9c3907a792af6b02fb9a3a2e47398f3401254"], &(0x7f0000000140)=0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000001c0)={r3, 0x7, 0x80000001, 0x80}, &(0x7f0000000200)=0x10) readv(r2, &(0x7f00000b4000)=[{&(0x7f0000938000)=""/247, 0x5f}], 0x1) accept4$packet(r2, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0x14, 0x80800) fcntl$setstatus(r1, 0x4, 0x400) setsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000300)={@remote={0xfe, 0x80, [], 0xbb}, r4}, 0x14) 2018/03/30 22:21:07 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) [ 1130.598071] xprt_adjust_timeout: rq_timeout = 0! [ 1130.606736] xprt_adjust_timeout: rq_timeout = 0! [ 1130.607765] xprt_adjust_timeout: rq_timeout = 0! [ 1130.611783] xprt_adjust_timeout: rq_timeout = 0! [ 1130.641458] FAULT_INJECTION: forcing a failure. [ 1130.641458] name failslab, interval 1, probability 0, space 0, times 0 [ 1130.652846] CPU: 0 PID: 22846 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1130.660049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1130.669409] Call Trace: [ 1130.672013] dump_stack+0x194/0x24d [ 1130.675655] ? arch_local_irq_restore+0x53/0x53 [ 1130.679634] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1130.680344] should_fail+0x8c0/0xa40 [ 1130.680366] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1130.680385] ? perf_trace_lock+0x900/0x900 [ 1130.680413] ? find_held_lock+0x35/0x1d0 [ 1130.696740] REISERFS (device loop7): using ordered data mode [ 1130.698119] ? __lock_is_held+0xb6/0x140 [ 1130.698158] ? check_same_owner+0x320/0x320 [ 1130.698169] ? __d_lookup+0x4f4/0x830 [ 1130.698188] ? rcu_note_context_switch+0x710/0x710 [ 1130.702421] reiserfs: using flush barriers [ 1130.706456] should_failslab+0xec/0x120 [ 1130.706472] kmem_cache_alloc+0x47/0x760 [ 1130.706497] __d_alloc+0xc1/0xbd0 [ 1130.723276] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1130.724405] ? shrink_dcache_for_umount+0x290/0x290 [ 1130.724424] ? d_alloc_parallel+0x1b40/0x1b40 [ 1130.724445] ? lock_release+0xa40/0xa40 [ 1130.724468] ? mark_held_locks+0xaf/0x100 [ 1130.771345] ? d_lookup+0x133/0x2e0 [ 1130.774960] ? d_lookup+0x1d5/0x2e0 [ 1130.778571] d_alloc+0x8e/0x340 [ 1130.781832] ? __d_alloc+0xbd0/0xbd0 [ 1130.785525] ? full_name_hash+0x9b/0xe0 [ 1130.789492] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1130.794752] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1130.798978] rpc_populate.constprop.15+0xa3/0x340 [ 1130.803816] rpc_fill_super+0x379/0xae0 [ 1130.807773] ? cap_capable+0x1b5/0x230 [ 1130.811643] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1130.816817] ? security_capable+0x8e/0xc0 [ 1130.820948] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1130.826121] ? ns_capable_common+0xcf/0x160 [ 1130.830428] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1130.835601] mount_ns+0xc4/0x190 [ 1130.838951] rpc_mount+0x9e/0xd0 [ 1130.842303] mount_fs+0x66/0x2d0 [ 1130.845654] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1130.850219] ? may_umount+0xa0/0xa0 [ 1130.853826] ? _raw_read_unlock+0x22/0x30 [ 1130.857965] ? __get_fs_type+0x8a/0xc0 [ 1130.861854] do_mount+0xea4/0x2bb0 [ 1130.865383] ? copy_mount_string+0x40/0x40 [ 1130.869601] ? rcu_pm_notify+0xc0/0xc0 [ 1130.873480] ? copy_mount_options+0x5f/0x2e0 [ 1130.877873] ? rcu_read_lock_sched_held+0x108/0x120 [ 1130.882873] ? kmem_cache_alloc_trace+0x459/0x740 [ 1130.887699] ? kasan_check_write+0x14/0x20 [ 1130.891919] ? copy_mount_options+0x1f7/0x2e0 [ 1130.896398] SyS_mount+0xab/0x120 [ 1130.899832] ? copy_mnt_ns+0xb30/0xb30 [ 1130.903702] do_syscall_64+0x281/0x940 [ 1130.907573] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 1130.913091] ? syscall_return_slowpath+0x550/0x550 [ 1130.918004] ? syscall_return_slowpath+0x2ac/0x550 [ 1130.922926] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1130.928276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1130.933109] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1130.938277] RIP: 0033:0x454e79 [ 1130.941446] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1130.949139] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1130.956388] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1130.963638] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1130.970888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1130.978137] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000004b 2018/03/30 22:21:08 executing program 6: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00008aefe1)="1f000000520007f2c200000000000001021cec0000ddff1ab4a300ffffa72b", 0x1f) recvmsg$netrom(r0, &(0x7f0000000040)={&(0x7f0000000080)=@full={{0x3, {"e53d07c9c3a1e9"}}, [{"9ad27b9c70da18"}, {"af47f56ec68326"}, {"7ed08bdb405ca8"}, {"2969b4927ec70e"}, {"de706ba0f6c733"}, {"36d6c5eefb9d9b"}, {"02d968e62e4775"}, {"ed73fe961b191c"}]}, 0x48, &(0x7f0000000000), 0x0, &(0x7f00000001c0)=ANY=[]}, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000580)='tunl0\x00') readv(r0, &(0x7f00000005c0)=[{&(0x7f0000000180)=""/124, 0x7c}, {&(0x7f0000000200)=""/192, 0xc0}, {&(0x7f00000002c0)=""/178, 0x1e}, {&(0x7f0000000380)=""/243, 0xf3}, {&(0x7f0000000480)=""/150, 0x96}, {&(0x7f0000000640)=""/30, 0x1e}, {&(0x7f0000000680)=""/58, 0x3a}], 0x7) 2018/03/30 22:21:08 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1130.987371] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 1131.001203] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 1131.037246] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:08 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:08 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443e") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:21:08 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}], 0x1, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1131.074064] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:08 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000f9a000)=[{&(0x7f00007a7000)="2900000021001900013d3510000a00060200000000000000000100040d001000000000240003000800", 0x29}], 0x1) 2018/03/30 22:21:08 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x0, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:08 executing program 4 (fault-call:13 fault-nth:76): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:21:08 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) getsockopt$inet_sctp6_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000000400), &(0x7f0000000880)=0x4) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000080000000000000000000000850000001b000000000000000000000085000000120000000000000000000000ff06ffff7c1b0000000000000000000018000000030000000000000000000000bf01feff080000000000000000000000d0f7fffffcffffff0000000000000000637f5e00ffffffff0000000000000000181a0000", @ANYRES32=r8, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1131.203302] xprt_adjust_timeout: rq_timeout = 0! [ 1131.209904] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1131.226583] netlink: 'syz-executor6': attribute type 16 has an invalid length. [ 1131.228244] REISERFS (device loop7): using ordered data mode [ 1131.239932] reiserfs: using flush barriers [ 1131.280857] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:08 executing program 6: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x90) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000680)={0x0, 0x8}, 0x8) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={0x0, {0x2}, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e21, @broadcast=0xffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffff00000000, 0x100000000}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000c40)=ANY=[@ANYRES32=0x0, @ANYBLOB="6b001d08bcc117394e4726b653544e8e98d35e42a0c506e43a3c7be62e8ff9f4ae3ece15cb146423c9f6b858c5512920f94f1b06d9dfa0efd4d7b1ee8eff6b04f22ecb728e99d2af3e297ba4c4b836379916959f3df9301f00100000c4f28067861cef28b31480b29d7c6beeb4bdf53b"], &(0x7f0000000280)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e20, @multicast1=0xe0000001}}, 0x1000, 0x2}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000acf000)={0x0, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000998f70)={0x100000001, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x90) getpeername(0xffffffffffffffff, &(0x7f0000000540)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, &(0x7f00000005c0)=0x80) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000d80)=ANY=[@ANYBLOB], 0x1) getpgrp(0xffffffffffffffff) prctl$setmm(0x23, 0x0, &(0x7f0000ffd000/0x1000)=nil) getsockopt$inet_int(r3, 0x0, 0x18, &(0x7f00000006c0), &(0x7f0000000700)=0x4) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000400)={0xffffffffffffffad, {{0x2, 0x4e24}}}, 0x88) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000740)={0x0, @in={{0x2, 0x0, @broadcast=0xffffffff}}, [0x81, 0x1, 0x327, 0x7, 0x0, 0x20, 0x2, 0x445cd569, 0x0, 0xfffffffffffffbff, 0x3f, 0x0, 0x3, 0x0, 0x3d15]}, &(0x7f0000000840)=0x100) recvfrom$ipx(r0, &(0x7f0000000880)=""/171, 0xab, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@rand_addr, @in6=@dev}}, {{}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000600)=0xe8) fstat(r2, &(0x7f0000000f40)) getresuid(&(0x7f0000000640), &(0x7f0000000c00), &(0x7f0000000d40)) getgroups(0x1, &(0x7f0000000fc0)=[0xffffffffffffffff]) getgroups(0x2, &(0x7f00000014c0)=[0xffffffffffffffff, 0xffffffffffffffff]) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001500)={{{@in=@loopback, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001600)=0xe8) getgroups(0x5, &(0x7f0000001640)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001680)={{{@in=@multicast1, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6}}, &(0x7f0000001780)=0xe8) stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)) getresgid(&(0x7f0000001c40), &(0x7f0000001c80), &(0x7f0000001cc0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002200), &(0x7f0000002240)=0xc) sendmmsg$unix(r3, &(0x7f00000022c0)=[{&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000100)}], 0x1, &(0x7f0000001000)}], 0x1, 0x4000) close(0xffffffffffffffff) [ 1131.308212] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:08 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:08 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1131.354423] FAULT_INJECTION: forcing a failure. [ 1131.354423] name failslab, interval 1, probability 0, space 0, times 0 [ 1131.365865] CPU: 0 PID: 22901 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1131.373060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1131.382418] Call Trace: [ 1131.385015] dump_stack+0x194/0x24d [ 1131.388659] ? arch_local_irq_restore+0x53/0x53 [ 1131.393357] should_fail+0x8c0/0xa40 [ 1131.397087] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1131.402199] ? trace_event_raw_event_lock+0x340/0x340 [ 1131.407397] ? find_held_lock+0x35/0x1d0 [ 1131.411455] ? __lock_is_held+0xb6/0x140 [ 1131.415520] ? check_same_owner+0x320/0x320 [ 1131.419827] ? d_alloc+0x269/0x340 [ 1131.423359] ? rcu_note_context_switch+0x710/0x710 [ 1131.428285] should_failslab+0xec/0x120 [ 1131.432256] kmem_cache_alloc+0x47/0x760 [ 1131.436307] ? d_drop+0x51/0x60 [ 1131.439568] ? rpc_i_callback+0x30/0x30 [ 1131.443523] rpc_alloc_inode+0x1a/0x20 [ 1131.447392] alloc_inode+0x65/0x180 [ 1131.451007] new_inode_pseudo+0x69/0x190 [ 1131.455059] ? prune_icache_sb+0x1a0/0x1a0 [ 1131.459276] ? do_raw_spin_trylock+0x190/0x190 [ 1131.463840] ? d_add+0xa70/0xa70 [ 1131.467195] new_inode+0x1c/0x40 [ 1131.470542] rpc_get_inode+0x20/0x1e0 [ 1131.474327] __rpc_create_common+0x5d/0x1d0 [ 1131.478637] rpc_populate.constprop.15+0x1ad/0x340 [ 1131.483556] rpc_fill_super+0x379/0xae0 [ 1131.487528] ? cap_capable+0x1b5/0x230 [ 1131.491402] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1131.496578] ? security_capable+0x8e/0xc0 [ 1131.500710] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1131.505881] ? ns_capable_common+0xcf/0x160 [ 1131.510186] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1131.515357] mount_ns+0xc4/0x190 [ 1131.518710] rpc_mount+0x9e/0xd0 [ 1131.522058] mount_fs+0x66/0x2d0 [ 1131.525408] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1131.529975] ? may_umount+0xa0/0xa0 [ 1131.533582] ? _raw_read_unlock+0x22/0x30 [ 1131.537710] ? __get_fs_type+0x8a/0xc0 [ 1131.541587] do_mount+0xea4/0x2bb0 [ 1131.545115] ? copy_mount_string+0x40/0x40 [ 1131.549334] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1131.554332] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1131.559078] ? retint_kernel+0x10/0x10 [ 1131.562957] ? copy_mount_options+0x18b/0x2e0 [ 1131.567435] ? copy_mount_options+0x196/0x2e0 [ 1131.571909] ? copy_mount_options+0x1f7/0x2e0 [ 1131.576392] SyS_mount+0xab/0x120 [ 1131.579826] ? copy_mnt_ns+0xb30/0xb30 [ 1131.583694] do_syscall_64+0x281/0x940 [ 1131.587564] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 1131.593084] ? syscall_return_slowpath+0x550/0x550 [ 1131.597995] ? syscall_return_slowpath+0x2ac/0x550 [ 1131.602914] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1131.608267] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1131.613096] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1131.618264] RIP: 0033:0x454e79 [ 1131.621433] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1131.629128] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1131.636377] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1131.643625] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1131.650875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1131.658124] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000004c [ 1131.665704] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfsd [ 1131.687399] xprt_adjust_timeout: rq_timeout = 0! [ 1131.700744] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 1131.711412] xprt_adjust_timeout: rq_timeout = 0! [ 1131.745057] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1131.764910] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space 2018/03/30 22:21:08 executing program 4 (fault-call:13 fault-nth:77): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:21:08 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') pread64(r0, &(0x7f0000000000)=""/85, 0xfe42, 0x0) 2018/03/30 22:21:08 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:21:08 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:08 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCGL2TPSTATS(r6, 0x80487436, &(0x7f0000000880)="556fe28e2eb743f98516897021764b807d8fca1fc1f6a3a84a126e3fcd121f88e9f91e72abe929c00af6815f29867a996ea9758176317267e9770bc50b7647b1476ce167afcf29e7113f01274bb0f7c4b684ed002cf1a0628645d941f121") ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af0000004200000000009500ddffffbf00"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000080000000000000000000000850000001b000000000000000000000085000000120000000000000000000000ff06ffff7c250000000000000000000018000000030000000000000000000000bf01feff080000000000000000000000d0f7fffffcffffff0000000000000000637f5e00ffffffff0000000000000000181a0000", @ANYRES32=r8, @ANYBLOB="00000000000000009500000000000000a60a4f0d2d3b42d74a8c42a72e3cd298ab1c193b959d26eaa9956d9d1184a985b7f464f6ed512e4b352b78a0a7c2805efa276f6d8f55619cee0a3b1bd1f1e4cf424296a36f"], &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:08 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:08 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:08 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443e") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:21:09 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') pread64(r0, &(0x7f0000000000)=""/85, 0xfe42, 0x0) [ 1131.928844] xprt_adjust_timeout: rq_timeout = 0! [ 1131.938720] xprt_adjust_timeout: rq_timeout = 0! [ 1131.944102] xprt_adjust_timeout: rq_timeout = 0! [ 1131.965651] FAULT_INJECTION: forcing a failure. [ 1131.965651] name failslab, interval 1, probability 0, space 0, times 0 [ 1131.976921] CPU: 1 PID: 22932 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1131.984107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1131.993455] Call Trace: [ 1131.996047] dump_stack+0x194/0x24d [ 1131.999675] ? arch_local_irq_restore+0x53/0x53 [ 1132.004350] should_fail+0x8c0/0xa40 [ 1132.008067] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1132.013145] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1132.013170] ? perf_trace_lock+0x900/0x900 [ 1132.025787] ? __lock_acquire+0x664/0x3e00 [ 1132.030031] ? find_held_lock+0x35/0x1d0 [ 1132.034095] ? __lock_is_held+0xb6/0x140 [ 1132.038169] ? check_same_owner+0x320/0x320 [ 1132.042489] ? __d_lookup+0x4f4/0x830 [ 1132.042749] REISERFS (device loop7): using ordered data mode [ 1132.046289] ? rcu_note_context_switch+0x710/0x710 [ 1132.046312] should_failslab+0xec/0x120 [ 1132.046325] kmem_cache_alloc+0x47/0x760 [ 1132.046345] __d_alloc+0xc1/0xbd0 [ 1132.046359] ? shrink_dcache_for_umount+0x290/0x290 [ 1132.046372] ? d_alloc_parallel+0x1b40/0x1b40 [ 1132.046386] ? lock_release+0xa40/0xa40 [ 1132.046407] ? mark_held_locks+0xaf/0x100 [ 1132.046417] ? d_lookup+0x133/0x2e0 [ 1132.046432] ? d_lookup+0x1d5/0x2e0 [ 1132.046445] d_alloc+0x8e/0x340 [ 1132.052247] reiserfs: using flush barriers [ 1132.057134] ? __d_alloc+0xbd0/0xbd0 [ 1132.057144] ? full_name_hash+0x9b/0xe0 [ 1132.057166] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1132.076554] xprt_adjust_timeout: rq_timeout = 0! [ 1132.078057] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1132.078079] rpc_populate.constprop.15+0xa3/0x340 [ 1132.078098] rpc_fill_super+0x379/0xae0 [ 1132.078112] ? cap_capable+0x1b5/0x230 [ 1132.078123] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1132.078138] ? security_capable+0x8e/0xc0 [ 1132.078151] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1132.078162] ? ns_capable_common+0xcf/0x160 [ 1132.078176] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1132.078186] mount_ns+0xc4/0x190 [ 1132.078199] rpc_mount+0x9e/0xd0 [ 1132.078212] mount_fs+0x66/0x2d0 [ 1132.088360] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1132.089914] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1132.089928] ? may_umount+0xa0/0xa0 [ 1132.089941] ? _raw_read_unlock+0x22/0x30 [ 1132.089951] ? __get_fs_type+0x8a/0xc0 [ 1132.089967] do_mount+0xea4/0x2bb0 [ 1132.089985] ? copy_mount_string+0x40/0x40 [ 1132.089997] ? rcu_pm_notify+0xc0/0xc0 [ 1132.090015] ? copy_mount_options+0x5f/0x2e0 [ 1132.090026] ? rcu_read_lock_sched_held+0x108/0x120 [ 1132.090037] ? kmem_cache_alloc_trace+0x459/0x740 [ 1132.090050] ? kasan_check_write+0x14/0x20 [ 1132.090066] ? copy_mount_options+0x1f7/0x2e0 [ 1132.090080] SyS_mount+0xab/0x120 [ 1132.090089] ? copy_mnt_ns+0xb30/0xb30 [ 1132.090103] do_syscall_64+0x281/0x940 [ 1132.239960] ? vmalloc_sync_all+0x30/0x30 [ 1132.244101] ? _raw_spin_unlock_irq+0x27/0x70 [ 1132.248575] ? finish_task_switch+0x1c1/0x7e0 [ 1132.253048] ? syscall_return_slowpath+0x550/0x550 [ 1132.257957] ? syscall_return_slowpath+0x2ac/0x550 [ 1132.262863] ? prepare_exit_to_usermode+0x350/0x350 [ 1132.267861] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1132.273204] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/30 22:21:09 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1132.278033] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1132.283199] RIP: 0033:0x454e79 [ 1132.286365] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1132.294056] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1132.301301] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1132.308545] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1132.315792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1132.323039] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000004d 2018/03/30 22:21:09 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:09 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') pread64(r0, &(0x7f0000000000)=""/85, 0xfe42, 0x0) 2018/03/30 22:21:09 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1132.366895] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:09 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1132.404456] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 22:21:09 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r3) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000440)={r5}) sendmsg$kcm(r6, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r6}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r6}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r4, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0xe2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000000040)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x200}, 0x1c) connect$inet6(r9, &(0x7f00000005c0)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x80000000}, 0x1c) read$eventfd(r7, &(0x7f0000000400), 0x8) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) 2018/03/30 22:21:09 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') pread64(r0, &(0x7f0000000000)=""/85, 0xfe42, 0x0) [ 1132.457388] xprt_adjust_timeout: rq_timeout = 0! [ 1132.475121] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:09 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:09 executing program 4 (fault-call:13 fault-nth:78): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:21:09 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1132.591465] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 1132.629777] xprt_adjust_timeout: rq_timeout = 0! [ 1132.659814] xprt_adjust_timeout: rq_timeout = 0! [ 1132.668149] xprt_adjust_timeout: rq_timeout = 0! [ 1132.693515] FAULT_INJECTION: forcing a failure. [ 1132.693515] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.704826] CPU: 1 PID: 22990 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1132.712006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1132.721358] Call Trace: [ 1132.723946] dump_stack+0x194/0x24d [ 1132.727579] ? arch_local_irq_restore+0x53/0x53 [ 1132.732260] should_fail+0x8c0/0xa40 [ 1132.735977] ? perf_trace_lock_acquire+0xe3/0x980 [ 1132.740826] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1132.745928] ? trace_event_raw_event_lock+0x340/0x340 [ 1132.751115] ? perf_trace_lock+0x900/0x900 [ 1132.755355] ? mark_held_locks+0xaf/0x100 [ 1132.759505] ? __raw_spin_lock_init+0x1c/0x100 [ 1132.764089] ? find_held_lock+0x35/0x1d0 [ 1132.768150] ? __lock_is_held+0xb6/0x140 [ 1132.772208] ? check_same_owner+0x320/0x320 [ 1132.776515] ? d_alloc+0x269/0x340 [ 1132.780053] ? rcu_note_context_switch+0x710/0x710 [ 1132.784968] should_failslab+0xec/0x120 [ 1132.788924] kmem_cache_alloc+0x47/0x760 [ 1132.792979] ? d_drop+0x51/0x60 [ 1132.796250] ? rpc_i_callback+0x30/0x30 [ 1132.800207] rpc_alloc_inode+0x1a/0x20 [ 1132.804071] alloc_inode+0x65/0x180 [ 1132.807674] new_inode_pseudo+0x69/0x190 [ 1132.811712] ? prune_icache_sb+0x1a0/0x1a0 [ 1132.815937] ? do_raw_spin_trylock+0x190/0x190 [ 1132.820518] ? d_add+0xa70/0xa70 [ 1132.823882] new_inode+0x1c/0x40 [ 1132.827243] rpc_get_inode+0x20/0x1e0 [ 1132.831045] __rpc_create_common+0x5d/0x1d0 [ 1132.835374] rpc_populate.constprop.15+0x1ad/0x340 [ 1132.840310] rpc_fill_super+0x379/0xae0 [ 1132.844289] ? cap_capable+0x1b5/0x230 [ 1132.848179] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1132.853372] ? security_capable+0x8e/0xc0 [ 1132.857518] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1132.862697] ? ns_capable_common+0xcf/0x160 [ 1132.866997] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1132.872174] mount_ns+0xc4/0x190 [ 1132.875535] rpc_mount+0x9e/0xd0 [ 1132.878898] mount_fs+0x66/0x2d0 [ 1132.882259] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1132.886817] ? may_umount+0xa0/0xa0 [ 1132.890420] ? _raw_read_unlock+0x22/0x30 [ 1132.894543] ? __get_fs_type+0x8a/0xc0 [ 1132.898417] do_mount+0xea4/0x2bb0 [ 1132.901943] ? copy_mount_string+0x40/0x40 [ 1132.906162] ? rcu_pm_notify+0xc0/0xc0 [ 1132.910044] ? copy_mount_options+0x5f/0x2e0 [ 1132.914429] ? rcu_read_lock_sched_held+0x108/0x120 [ 1132.919422] ? kmem_cache_alloc_trace+0x459/0x740 [ 1132.924240] ? kasan_check_write+0x14/0x20 [ 1132.928463] ? copy_mount_options+0x1f7/0x2e0 [ 1132.932942] SyS_mount+0xab/0x120 [ 1132.936369] ? copy_mnt_ns+0xb30/0xb30 [ 1132.940240] do_syscall_64+0x281/0x940 [ 1132.944112] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 1132.949624] ? syscall_return_slowpath+0x550/0x550 [ 1132.954530] ? syscall_return_slowpath+0x2ac/0x550 [ 1132.959438] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1132.964788] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1132.969611] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1132.974779] RIP: 0033:0x454e79 [ 1132.977952] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1132.985640] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1132.992888] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1133.000132] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1133.007379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1133.014634] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000004e [ 1133.022137] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry gssd [ 1133.031978] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 1133.049427] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:10 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443e") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:21:10 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:10 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:10 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000300)={0x6}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:21:10 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000940)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x13}, 0xfffffffffffffe0c) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000400)={0x2, [0x0, 0x0]}, &(0x7f0000000880)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f00000008c0)={0x80000000, 0x1, 0x7c633a9e, 0x67e5, r8}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000009c0)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r10, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f6d1f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x2d, 0x4000}, 0x4884) recvmsg(r10, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r9}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x15, &(0x7f0000000a40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x4}, @ldst={0x3, 0x3, 0x3, 0xf, 0x0, 0x8, 0xfffffffffffffffd}, @generic={0x1fe00000000000, 0xfffffffffffffc01, 0x5}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, @map={0x18, 0xa, 0x1, 0x0, r7}, @generic={0xa6, 0xffffffffffffff00, 0xffff, 0x7}, @ldst={0x3, 0x0, 0x6, 0x4, 0xa, 0xc, 0xfffffffffffffffc}, @ldst={0x3, 0x1, 0x2, 0x8, 0x0, 0xfffffffd, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:10 executing program 4 (fault-call:13 fault-nth:79): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:21:10 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:10 executing program 6: pread64(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0xfe42, 0x0) 2018/03/30 22:21:10 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') pread64(0xffffffffffffffff, &(0x7f0000000000)=""/85, 0xfe42, 0x0) 2018/03/30 22:21:10 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1133.178651] xprt_adjust_timeout: rq_timeout = 0! [ 1133.184850] xprt_adjust_timeout: rq_timeout = 0! [ 1133.208013] xprt_adjust_timeout: rq_timeout = 0! [ 1133.245232] FAULT_INJECTION: forcing a failure. [ 1133.245232] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.256538] CPU: 1 PID: 23021 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1133.263721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1133.273070] Call Trace: [ 1133.275664] dump_stack+0x194/0x24d [ 1133.279290] ? arch_local_irq_restore+0x53/0x53 [ 1133.283957] should_fail+0x8c0/0xa40 [ 1133.287654] ? perf_trace_lock_acquire+0xe3/0x980 [ 1133.292483] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1133.297566] ? trace_event_raw_event_lock+0x340/0x340 [ 1133.302736] ? perf_trace_lock+0x900/0x900 [ 1133.306947] ? mark_held_locks+0xaf/0x100 [ 1133.311071] ? __raw_spin_lock_init+0x1c/0x100 [ 1133.315633] ? find_held_lock+0x35/0x1d0 [ 1133.319678] ? __lock_is_held+0xb6/0x140 [ 1133.323723] ? check_same_owner+0x320/0x320 [ 1133.328025] ? d_alloc+0x269/0x340 [ 1133.331547] ? rcu_note_context_switch+0x710/0x710 [ 1133.336461] should_failslab+0xec/0x120 [ 1133.340415] kmem_cache_alloc+0x47/0x760 [ 1133.344455] ? d_drop+0x51/0x60 [ 1133.347736] ? rpc_i_callback+0x30/0x30 [ 1133.351687] rpc_alloc_inode+0x1a/0x20 [ 1133.355552] alloc_inode+0x65/0x180 [ 1133.359155] new_inode_pseudo+0x69/0x190 [ 1133.363194] ? prune_icache_sb+0x1a0/0x1a0 [ 1133.367408] ? do_raw_spin_trylock+0x190/0x190 [ 1133.371966] ? d_add+0xa70/0xa70 [ 1133.375318] new_inode+0x1c/0x40 [ 1133.378667] rpc_get_inode+0x20/0x1e0 [ 1133.382448] __rpc_create_common+0x5d/0x1d0 [ 1133.386747] ? __d_lookup+0x830/0x830 [ 1133.390530] rpc_populate.constprop.15+0x126/0x340 [ 1133.395442] rpc_fill_super+0x831/0xae0 [ 1133.399394] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1133.404561] ? security_capable+0x8e/0xc0 [ 1133.408687] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1133.413853] ? ns_capable_common+0xcf/0x160 [ 1133.418156] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1133.423323] mount_ns+0xc4/0x190 [ 1133.426668] rpc_mount+0x9e/0xd0 [ 1133.430016] mount_fs+0x66/0x2d0 [ 1133.433365] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1133.437925] ? may_umount+0xa0/0xa0 [ 1133.441531] ? _raw_read_unlock+0x22/0x30 [ 1133.445658] ? __get_fs_type+0x8a/0xc0 [ 1133.449525] do_mount+0xea4/0x2bb0 [ 1133.453047] ? copy_mount_string+0x40/0x40 [ 1133.457261] ? rcu_pm_notify+0xc0/0xc0 [ 1133.461132] ? copy_mount_options+0x5f/0x2e0 [ 1133.465516] ? rcu_read_lock_sched_held+0x108/0x120 [ 1133.470511] ? kmem_cache_alloc_trace+0x459/0x740 [ 1133.475335] ? copy_mount_options+0x1f7/0x2e0 [ 1133.479811] SyS_mount+0xab/0x120 [ 1133.483239] ? copy_mnt_ns+0xb30/0xb30 [ 1133.487107] do_syscall_64+0x281/0x940 [ 1133.490993] ? vmalloc_sync_all+0x30/0x30 [ 1133.495120] ? _raw_spin_unlock_irq+0x27/0x70 [ 1133.499593] ? finish_task_switch+0x1c1/0x7e0 [ 1133.504065] ? syscall_return_slowpath+0x550/0x550 [ 1133.508970] ? syscall_return_slowpath+0x2ac/0x550 [ 1133.513878] ? prepare_exit_to_usermode+0x350/0x350 [ 1133.518872] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1133.524213] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1133.529041] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1133.534208] RIP: 0033:0x454e79 [ 1133.537372] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 22:21:10 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:10 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1133.545060] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1133.552310] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1133.559556] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1133.566801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1133.574047] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000004f [ 1133.581655] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry info 2018/03/30 22:21:10 executing program 6: syz_open_dev$urandom(&(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x8100) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000080)=[0xe00000], 0x1, 0x81, 0x2, 0x6, 0x3f, 0x7, {0x9860, 0x5, 0x7ff, 0x2, 0x2, 0x4, 0x1f5a, 0x3, 0x4, 0x7, 0x9, 0xe75, 0x8, 0x6, "1feaf45abd4aa06c95db1c69dadadce14de1e536877f0dd2f0f2a328b552667c"}}) r1 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x20000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0, 0x0, 0x0], 0x3}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f00000002c0)={0x7, 0x20, 0x81}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000340)={0x400, 0x4, 0x8000, 0x1dc, 0x1, 0x5b}) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f00000003c0)={0x1, {{0xa, 0x4e24, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0xba}}, {{0xa, 0x4e21, 0x8001, @mcast2={0xff, 0x2, [], 0x1}, 0x9}}}, 0x108) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000600)=0xe8) sendmsg$key(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000640)={0x2, 0xc, 0x3, 0x8, 0xf, 0x0, 0x70bd27, 0x25dfdbff, [@sadb_x_sec_ctx={0xd, 0x18, 0x4, 0x7, 0x5a, "1aa990572d4405995f3836cf2fd917e7763ef47fbce81bd223e0dbbc50be9401110bca28c98c408f4d760449e0dc6becb898ef4f5d78c17a4d3f7f78174b505316abce1047d61dec93f0e08413476739635564d2e5f9e808034f"}]}, 0x78}, 0x1}, 0x20000000) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000780)) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000007c0)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000800)={r4, 0x18}) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000840)={0x100000001, 0x1, 0x10001, 0x4, 0x7, 0x5, 0x4, 0x2, 0x8, 0x3}) ioctl$VT_DISALLOCATE(r2, 0x5608) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000880)={@reserved=0x1}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f00000008c0), &(0x7f0000000900)=0x8) syz_open_dev$vcsn(&(0x7f0000000940)='/dev/vcs#\x00', 0x639, 0x4000) r5 = syz_open_dev$sndmidi(&(0x7f0000000980)='/dev/snd/midiC#D#\x00', 0x923f, 0x100) write$eventfd(r5, &(0x7f00000009c0)=0x8, 0x8) syz_mount_image$msdos(&(0x7f0000000a00)='msdos\x00', &(0x7f0000000a40)='./file0\x00', 0x4, 0x1, &(0x7f0000000b80)=[{&(0x7f0000000a80)="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", 0xfb, 0x9}], 0x1000000, &(0x7f0000000bc0)={[{@gid={'gid', 0x3d, [0x31, 0x31]}, 0x2c}, {@flush='flush', 0x2c}]}) fstatfs(r5, &(0x7f0000000c00)=""/87) r6 = syz_open_dev$dmmidi(&(0x7f0000000c80)='/dev/dmmidi#\x00', 0x2, 0x10001) ioctl$EVIOCSABS2F(r6, 0x401845ef, &(0x7f0000000cc0)={0x3, 0x8, 0x2, 0x3, 0x59, 0x8}) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r3, r7) ioctl$KVM_IRQ_LINE(r6, 0x4008ae61, &(0x7f0000000dc0)={0x39f, 0x5}) [ 1133.628586] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1133.636441] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory clntXX [ 1133.653227] REISERFS (device loop7): using ordered data mode [ 1133.659224] reiserfs: using flush barriers [ 1133.687612] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1133.699736] xprt_adjust_timeout: rq_timeout = 0! [ 1133.707960] xprt_adjust_timeout: rq_timeout = 0! [ 1133.714095] FAT-fs (loop6): bogus number of reserved sectors [ 1133.720158] FAT-fs (loop6): Can't find a valid FAT filesystem [ 1133.728061] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space 2018/03/30 22:21:10 executing program 4 (fault-call:13 fault-nth:80): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:21:10 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:10 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1133.794443] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:10 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:10 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443ea999a6db33e4de4c") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) [ 1133.884935] FAULT_INJECTION: forcing a failure. [ 1133.884935] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.896519] CPU: 0 PID: 23063 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1133.903716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1133.913074] Call Trace: [ 1133.915670] dump_stack+0x194/0x24d [ 1133.919317] ? arch_local_irq_restore+0x53/0x53 [ 1133.924018] should_fail+0x8c0/0xa40 [ 1133.927751] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1133.932872] ? perf_trace_lock+0x900/0x900 [ 1133.937127] ? __lock_acquire+0x664/0x3e00 [ 1133.941386] ? find_held_lock+0x35/0x1d0 [ 1133.945478] ? __lock_is_held+0xb6/0x140 [ 1133.949570] ? check_same_owner+0x320/0x320 [ 1133.950203] xprt_adjust_timeout: rq_timeout = 0! [ 1133.953889] ? __d_lookup+0x4f4/0x830 [ 1133.953928] ? rcu_note_context_switch+0x710/0x710 [ 1133.953958] should_failslab+0xec/0x120 [ 1133.971375] kmem_cache_alloc+0x47/0x760 [ 1133.975465] __d_alloc+0xc1/0xbd0 [ 1133.978930] ? shrink_dcache_for_umount+0x290/0x290 [ 1133.982457] xprt_adjust_timeout: rq_timeout = 0! [ 1133.983953] ? d_alloc_parallel+0x1b40/0x1b40 [ 1133.983976] ? lock_release+0xa40/0xa40 [ 1133.984001] ? mark_held_locks+0xaf/0x100 [ 1133.984016] ? d_lookup+0x133/0x2e0 [ 1133.984039] ? d_lookup+0x1d5/0x2e0 [ 1133.984056] d_alloc+0x8e/0x340 [ 1134.004465] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1134.004975] ? __d_alloc+0xbd0/0xbd0 [ 1134.004993] ? full_name_hash+0x9b/0xe0 [ 1134.005027] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1134.005040] ? down_write_nested+0x8b/0x120 [ 1134.005054] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1134.005066] ? _down_write_nest_lock+0x120/0x120 [ 1134.010566] REISERFS (device loop7): using ordered data mode [ 1134.011942] ? __d_lookup+0x830/0x830 [ 1134.011968] rpc_mkpipe_dentry+0xf8/0x360 [ 1134.011990] rpc_fill_super+0x85e/0xae0 [ 1134.012011] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1134.012032] ? security_capable+0x8e/0xc0 [ 1134.012049] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1134.012062] ? ns_capable_common+0xcf/0x160 [ 1134.012080] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1134.012092] mount_ns+0xc4/0x190 [ 1134.012108] rpc_mount+0x9e/0xd0 [ 1134.020514] reiserfs: using flush barriers [ 1134.024191] mount_fs+0x66/0x2d0 [ 1134.024211] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1134.024225] ? may_umount+0xa0/0xa0 [ 1134.110537] ? _raw_read_unlock+0x22/0x30 [ 1134.114670] ? __get_fs_type+0x8a/0xc0 [ 1134.118544] do_mount+0xea4/0x2bb0 [ 1134.122072] ? copy_mount_string+0x40/0x40 [ 1134.126292] ? rcu_pm_notify+0xc0/0xc0 [ 1134.130167] ? copy_mount_options+0x5f/0x2e0 [ 1134.134555] ? rcu_read_lock_sched_held+0x108/0x120 [ 1134.139552] ? kmem_cache_alloc_trace+0x459/0x740 [ 1134.144378] ? kasan_check_write+0x14/0x20 [ 1134.148594] ? _copy_from_user+0x99/0x110 [ 1134.152728] ? copy_mount_options+0x1f7/0x2e0 [ 1134.157207] SyS_mount+0xab/0x120 [ 1134.160644] ? copy_mnt_ns+0xb30/0xb30 [ 1134.164515] do_syscall_64+0x281/0x940 [ 1134.168384] ? vmalloc_sync_all+0x30/0x30 [ 1134.172511] ? _raw_spin_unlock_irq+0x27/0x70 [ 1134.176988] ? finish_task_switch+0x1c1/0x7e0 [ 1134.181467] ? syscall_return_slowpath+0x550/0x550 [ 1134.186379] ? syscall_return_slowpath+0x2ac/0x550 [ 1134.191292] ? prepare_exit_to_usermode+0x350/0x350 [ 1134.196291] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1134.201640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1134.206471] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1134.211641] RIP: 0033:0x454e79 [ 1134.214810] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1134.222501] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1134.229755] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1134.237008] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1134.244265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1134.251513] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000050 [ 1134.260930] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1134.275624] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 1134.297964] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:11 executing program 4 (fault-call:13 fault-nth:81): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:21:11 executing program 6: syz_emit_ethernet(0x6e, &(0x7f00000002c0)={@link_local={0x1, 0x80, 0xc2}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1=0xe0000001, {[@cipso={0x86, 0x6}]}}, @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd}, {0x8, 0x88be, 0x0, {{0x0, 0x1}, 0x1}}, {0x8, 0x22eb, 0x0, {{0x0, 0x2}, 0x2}}, {0x8, 0x6558}}}}}}, &(0x7f0000ea3000)) 2018/03/30 22:21:11 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:11 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443ea999a6db33e4de4c5af50ebf") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:21:11 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:11 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:21:11 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000940)={r4}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000880)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="b3bc00000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce09c00000000000000009500ddffff000000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x20000120, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x1, [], r10}, 0x48) 2018/03/30 22:21:11 executing program 6: mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) chmod(&(0x7f00000002c0)='./file0\x00', 0x0) [ 1134.454095] xprt_adjust_timeout: rq_timeout = 0! [ 1134.461901] xprt_adjust_timeout: rq_timeout = 0! [ 1134.481059] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:11 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1134.537972] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1134.552191] REISERFS (device loop7): using ordered data mode [ 1134.558154] reiserfs: using flush barriers [ 1134.571922] xprt_adjust_timeout: rq_timeout = 0! [ 1134.599253] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1134.607551] FAULT_INJECTION: forcing a failure. [ 1134.607551] name failslab, interval 1, probability 0, space 0, times 0 [ 1134.619448] CPU: 1 PID: 23105 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1134.626635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1134.635985] Call Trace: [ 1134.638563] dump_stack+0x194/0x24d [ 1134.642174] ? arch_local_irq_restore+0x53/0x53 [ 1134.646829] should_fail+0x8c0/0xa40 [ 1134.650520] ? perf_trace_lock_acquire+0xe3/0x980 [ 1134.655342] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1134.660424] ? trace_event_raw_event_lock+0x340/0x340 [ 1134.665590] ? perf_trace_lock+0x900/0x900 [ 1134.669804] ? mark_held_locks+0xaf/0x100 [ 1134.673929] ? __raw_spin_lock_init+0x1c/0x100 [ 1134.678491] ? find_held_lock+0x35/0x1d0 [ 1134.682537] ? __lock_is_held+0xb6/0x140 [ 1134.686584] ? check_same_owner+0x320/0x320 [ 1134.690883] ? d_alloc+0x269/0x340 [ 1134.694402] ? rcu_note_context_switch+0x710/0x710 [ 1134.699322] should_failslab+0xec/0x120 [ 1134.703280] kmem_cache_alloc+0x47/0x760 [ 1134.707320] ? d_drop+0x51/0x60 [ 1134.710580] ? rpc_i_callback+0x30/0x30 [ 1134.714530] rpc_alloc_inode+0x1a/0x20 [ 1134.718398] alloc_inode+0x65/0x180 [ 1134.722006] new_inode_pseudo+0x69/0x190 [ 1134.726051] ? prune_icache_sb+0x1a0/0x1a0 [ 1134.730264] ? do_raw_spin_trylock+0x190/0x190 [ 1134.734825] ? d_add+0xa70/0xa70 [ 1134.738172] new_inode+0x1c/0x40 [ 1134.741515] rpc_get_inode+0x20/0x1e0 [ 1134.745294] __rpc_create_common+0x5d/0x1d0 [ 1134.749597] rpc_mkpipe_dentry+0x122/0x360 [ 1134.753816] rpc_fill_super+0x85e/0xae0 [ 1134.757771] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1134.762941] ? security_capable+0x8e/0xc0 [ 1134.767065] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1134.772234] ? ns_capable_common+0xcf/0x160 [ 1134.776533] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1134.781697] mount_ns+0xc4/0x190 [ 1134.785041] rpc_mount+0x9e/0xd0 [ 1134.788388] mount_fs+0x66/0x2d0 [ 1134.791733] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1134.796292] ? may_umount+0xa0/0xa0 [ 1134.799895] ? _raw_read_unlock+0x22/0x30 [ 1134.804026] ? __get_fs_type+0x8a/0xc0 [ 1134.807892] do_mount+0xea4/0x2bb0 [ 1134.811412] ? copy_mount_string+0x40/0x40 [ 1134.815624] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1134.820619] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1134.825355] ? retint_kernel+0x10/0x10 [ 1134.829226] ? copy_mount_options+0x183/0x2e0 [ 1134.833698] ? copy_mount_options+0x1f7/0x2e0 [ 1134.838173] SyS_mount+0xab/0x120 [ 1134.841602] ? copy_mnt_ns+0xb30/0xb30 [ 1134.845467] do_syscall_64+0x281/0x940 [ 1134.849334] ? vmalloc_sync_all+0x30/0x30 [ 1134.853456] ? _raw_spin_unlock_irq+0x27/0x70 [ 1134.857929] ? finish_task_switch+0x1c1/0x7e0 [ 1134.862403] ? syscall_return_slowpath+0x550/0x550 [ 1134.867307] ? syscall_return_slowpath+0x2ac/0x550 [ 1134.872215] ? prepare_exit_to_usermode+0x350/0x350 [ 1134.877214] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1134.882559] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1134.887383] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1134.892547] RIP: 0033:0x454e79 [ 1134.895713] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1134.903397] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1134.910642] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1134.917902] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1134.925148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1134.932395] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000051 [ 1134.939814] xprt_adjust_timeout: rq_timeout = 0! [ 1134.939839] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry gssd [ 1134.980601] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space [ 1135.011114] xprt_adjust_timeout: rq_timeout = 0! [ 1135.017989] net/sunrpc/rpc_pipe.c: rpc_mkpipe_dentry() failed to create pipe clntXX/gssd (errno = -12) 2018/03/30 22:21:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f000028fff7)='/dev/sg#\x00', 0x0, 0x0) ioctl(r0, 0x4000000000001276, &(0x7f0000000040)) getsockopt$nfc_llcp(r0, 0x118, 0x0, &(0x7f0000000740)=""/223, 0x21) r1 = accept4$nfc_llcp(r0, &(0x7f0000000fc0), &(0x7f0000000080)=0x60, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000180)={0x0, r1, 0x1}) ftruncate(0xffffffffffffffff, 0x45) r2 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) add_key$user(&(0x7f0000000d80)='user\x00', &(0x7f0000000dc0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000f00)="9ed6a70e5502a3be7fd56ef0239bd02d3719d6fadbc6cd1c363228811d2ba048c116638f8b94dc73", 0x28, 0xfffffffffffffff9) add_key(&(0x7f0000000e40)='asymmetric\x00', &(0x7f0000000e80)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000ec0)="84673a4debb1c015496118ed96232949279e9b36b1", 0x15, 0xfffffffffffffffc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, r3, 0x10, 0x70bd27, 0x25dfdbfd, {0x5}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000001}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7b}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x49}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) readv(r2, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/250, 0xfa}, {&(0x7f0000000940)=""/100, 0x64}, {&(0x7f00000009c0)=""/231, 0xe7}, {&(0x7f00000000c0)=""/50, 0x32}, {&(0x7f0000000ac0)=""/170, 0xaa}, {&(0x7f0000000b80)=""/134, 0x86}, {&(0x7f0000000c40)=""/148, 0x94}], 0x7) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000300)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000140)={r0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000e00)=[@in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x10000, @loopback={0x0, 0x1}, 0x3}, @in={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x3c) 2018/03/30 22:21:12 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:12 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:12 executing program 7: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = syz_open_dev$sg(&(0x7f000051b000)='/dev/sg#\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000500)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000580)) ioctl$KVM_SET_PIT(r1, 0xc0481273, &(0x7f000084cf90)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x8, 0x0, 0x3}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000300)=[@in={0x2, 0x4e20, @multicast2=0xe0000002}, @in={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x19}, 0x5}, @in6={0xa, 0x4e24, 0x4, @mcast1={0xff, 0x1, [], 0x1}}, @in6={0xa, 0x4e24, 0xfffffffffffffe01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}], 0x481) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved=0x1}, 0x10, 0x0) timer_create(0x7, &(0x7f00000003c0)={0x0, 0x2d}, &(0x7f0000000400)=0x0) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000600)={0x81, 0x0, [0x4, 0x1, 0x5, 0x9]}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000005c0)={0x5, 0x2, 0x203, 0x4, 0x1, 0x2, 0x4, 0x0, 0x6, 0x4, 0xfff}, 0xb) r6 = creat(&(0x7f00000006c0)='./file0\x00', 0x102) ioctl$sock_bt_hci(r6, 0x800448d2, &(0x7f0000000700)="8d66da223e2c5de239a604fd99127d66146e38a69253779aa94fbe99e9c69c66a2a5b298c5c665bff59a26b186967dece7e2e718d1132edf5c9c5d1f57ca76bb3f273d31b06a3dcba4de37fbde4ace8ab49734f23f8378744f0c1327e4fddafb823cfa63a08c7602b5a57f8c64b09d683cc8af93443ea999a6db33e4de4c5af50ebf") syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x7, 0x400000) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="00080000ec050000130200001200000000090000000200000001000024d96443e10000001e000000000000000010ec0302000100526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000011400)) timer_gettime(r5, &(0x7f0000000440)) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x6, 0x3f, 0x7, 0x99]}) 2018/03/30 22:21:12 executing program 6: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = open(&(0x7f0000039000)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./control\x00', 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000700)={&(0x7f0000ffb000/0x1000)=nil, 0x1000}) mkdirat(r0, &(0x7f0000016ff8)='./file0\x00', 0x0) r1 = openat(r0, &(0x7f0000025000)='./file0\x00', 0x0, 0x0) splice(r0, &(0x7f0000000040), r1, &(0x7f0000000200), 0xfffffffffffffffc, 0x8) r2 = openat(r1, &(0x7f0000000140)='./control\x00', 0x80000, 0x0) mkdirat(r1, &(0x7f0000000100)='./control\x00', 0x0) mknodat(r0, &(0x7f0000000000)='./control/file0\x00', 0x0, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000300)={0x1a}) renameat2(r1, &(0x7f000003aff6)='./control\x00', r0, &(0x7f0000000180)='./control/file0\x00', 0x2) mknodat(r0, &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffff9) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000240)={0x0, 0x0, 0x3}) dup3(0xffffffffffffffff, r1, 0x80000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f00000004c0)={r3, 0x80000, r2}) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000340)={0x0, 0x1, 0x100000, 0x7, 0x1, 0x1, 0xff, 0x10000, 0x7, 0x80000001}) statfs(&(0x7f00000002c0)='./control/file0\x00', &(0x7f0000000380)=""/18) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000280)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000500)=[@in6={0xa, 0x4e20, 0x2, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x3}, @in={0x2, 0x4e22, @broadcast=0xffffffff}, @in6={0xa, 0x4e20, 0x95, @mcast2={0xff, 0x2, [], 0x1}, 0x1}, @in6={0xa, 0x4e21, 0xfc, @local={0xfe, 0x80, [], 0xaa}, 0x538}, @in={0x2}, @in6={0xa, 0x4e22, 0x40, @mcast1={0xff, 0x1, [], 0x1}}, @in={0x2, 0x4e20, @multicast1=0xe0000001}], 0xa0) 2018/03/30 22:21:12 executing program 4 (fault-call:13 fault-nth:82): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:21:12 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) ioctl$KDSETLED(r6, 0x4b32, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:21:12 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x0, &(0x7f0000000000)=@raw, &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1135.398132] xprt_adjust_timeout: rq_timeout = 0! [ 1135.404922] xprt_adjust_timeout: rq_timeout = 0! [ 1135.406635] xprt_adjust_timeout: rq_timeout = 0! [ 1135.421259] xprt_adjust_timeout: rq_timeout = 0! [ 1135.423457] REISERFS (device loop7): found reiserfs format "3.5" with non-standard journal [ 1135.454427] FAULT_INJECTION: forcing a failure. [ 1135.454427] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.460754] REISERFS (device loop7): using ordered data mode [ 1135.465742] CPU: 1 PID: 23148 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1135.465751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1135.465761] Call Trace: [ 1135.471590] reiserfs: using flush barriers [ 1135.478731] dump_stack+0x194/0x24d [ 1135.478747] ? arch_local_irq_restore+0x53/0x53 2018/03/30 22:21:12 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r1, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0x0, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1135.478769] should_fail+0x8c0/0xa40 [ 1135.478783] ? perf_trace_lock_acquire+0xe3/0x980 [ 1135.511693] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1135.516794] ? trace_event_raw_event_lock+0x340/0x340 [ 1135.521983] ? perf_trace_lock+0x900/0x900 [ 1135.526213] ? mark_held_locks+0xaf/0x100 [ 1135.530359] ? __raw_spin_lock_init+0x1c/0x100 [ 1135.534943] ? find_held_lock+0x35/0x1d0 [ 1135.539522] ? __lock_is_held+0xb6/0x140 [ 1135.543589] ? check_same_owner+0x320/0x320 [ 1135.547904] ? d_alloc+0x269/0x340 [ 1135.551445] ? rcu_note_context_switch+0x710/0x710 [ 1135.556381] should_failslab+0xec/0x120 [ 1135.560354] kmem_cache_alloc+0x47/0x760 [ 1135.564411] ? d_drop+0x51/0x60 [ 1135.567687] ? rpc_i_callback+0x30/0x30 [ 1135.571653] rpc_alloc_inode+0x1a/0x20 [ 1135.575521] alloc_inode+0x65/0x180 [ 1135.579131] new_inode_pseudo+0x69/0x190 [ 1135.583176] ? prune_icache_sb+0x1a0/0x1a0 [ 1135.587388] ? do_raw_spin_trylock+0x190/0x190 [ 1135.591945] ? d_add+0xa70/0xa70 [ 1135.595295] new_inode+0x1c/0x40 [ 1135.598640] rpc_get_inode+0x20/0x1e0 [ 1135.602418] __rpc_create_common+0x5d/0x1d0 [ 1135.606715] ? __d_lookup+0x830/0x830 [ 1135.610495] rpc_populate.constprop.15+0x126/0x340 [ 1135.615404] rpc_fill_super+0x831/0xae0 [ 1135.619361] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1135.624531] ? security_capable+0x8e/0xc0 [ 1135.628658] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1135.633827] ? ns_capable_common+0xcf/0x160 [ 1135.638148] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1135.643319] mount_ns+0xc4/0x190 [ 1135.646666] rpc_mount+0x9e/0xd0 [ 1135.650015] mount_fs+0x66/0x2d0 [ 1135.653364] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1135.657924] ? may_umount+0xa0/0xa0 [ 1135.661529] ? _raw_read_unlock+0x22/0x30 [ 1135.665655] ? __get_fs_type+0x8a/0xc0 [ 1135.669524] do_mount+0xea4/0x2bb0 [ 1135.673047] ? copy_mount_string+0x40/0x40 [ 1135.677262] ? rcu_pm_notify+0xc0/0xc0 [ 1135.681132] ? copy_mount_options+0x5f/0x2e0 [ 1135.685520] ? rcu_read_lock_sched_held+0x108/0x120 [ 1135.690513] ? kmem_cache_alloc_trace+0x459/0x740 [ 1135.695333] ? kasan_check_write+0x14/0x20 [ 1135.699549] ? copy_mount_options+0x1f7/0x2e0 [ 1135.704027] SyS_mount+0xab/0x120 [ 1135.707456] ? copy_mnt_ns+0xb30/0xb30 [ 1135.711322] do_syscall_64+0x281/0x940 [ 1135.715185] ? vmalloc_sync_all+0x30/0x30 [ 1135.719313] ? _raw_spin_unlock_irq+0x27/0x70 [ 1135.723786] ? finish_task_switch+0x1c1/0x7e0 [ 1135.728256] ? syscall_return_slowpath+0x550/0x550 [ 1135.733162] ? syscall_return_slowpath+0x2ac/0x550 [ 1135.738066] ? prepare_exit_to_usermode+0x350/0x350 [ 1135.743058] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1135.748400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1135.753225] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1135.758392] RIP: 0033:0x454e79 [ 1135.761560] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1135.769247] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1135.776492] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1135.783739] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1135.790984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1135.798229] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000052 2018/03/30 22:21:12 executing program 6: r0 = memfd_create(&(0x7f0000000100)=']\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$cgroup_pid(r2, &(0x7f0000001540)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64=r1, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYPTR64]], @ANYPTR64=&(0x7f0000001580)=ANY=[@ANYBLOB="54f00beea6947b11bbbe7478b57a0a48d649482a1364228a4159323dbba0613353dac3230923548ed9d69522243a18d51f16b3c9dced88c29ca71404786250527b379e6dbbb2befbe27a5362899bbec61427abe537939e8895351254f5ba9a47b037657b15d2c204cdc8b5a8ff2219a4bb6f982ec6b45635caf22c22c913afa1e4fbad9f80ce234247c510a61e9c9d9e067ad7f400d068776c0c28b6d3419bcade3f16be0e7f69e0"]], 0x10) fallocate(r2, 0x0, 0x0, 0xffff) r3 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r3) epoll_wait(r3, &(0x7f00000003c0)=[{}], 0x5d, 0x0) clone(0x0, &(0x7f0000b53000), &(0x7f000084effc), &(0x7f0000c35ffc), &(0x7f0000b3bfff)) wait4(0x0, 0x0, 0x40000000, &(0x7f0000781f70)) pipe(&(0x7f0000000480)={0xffffffffffffffff}) ioctl$DRM_IOCTL_SG_ALLOC(r4, 0xc0106438, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, 0x8) clone(0x0, &(0x7f000052cf69), &(0x7f0000850ffc), &(0x7f0000e9b000), &(0x7f0000ce4000)) exit_group(0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000280)=""/157) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000400)={'ipddp0\x00'}) [ 1135.805690] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry info [ 1135.830423] xprt_adjust_timeout: rq_timeout = 0! [ 1135.848362] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory clntXX 2018/03/30 22:21:12 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x0, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x0, &(0x7f0000000000)=@raw, &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1135.849600] REISERFS warning (device loop7): sh-459 journal_init: unable to read journal header [ 1135.869093] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:21:13 executing program 5: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x0) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x0, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1135.904765] REISERFS warning (device loop7): sh-2022 reiserfs_fill_super: unable to initialize journal space 2018/03/30 22:21:13 executing program 4 (fault-call:13 fault-nth:83): socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x100) mkdir(&(0x7f0000000580)='./file1\x00', 0xfffffffffffffffd) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r1}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") lsetxattr(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)=@random={'security.', 'nfs\x00'}, &(0x7f0000000600)=',posix_acl_accessppp1vmnet1\x00', 0x1c, 0x2) connect$ipx(r2, &(0x7f0000000640)={0x4, 0x2, 0x8000, "27363a69e1bb", 0x80000001}, 0x10) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:21:13 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x0, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x0, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r3, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) setsockopt$bt_BT_CHANNEL_POLICY(r6, 0x112, 0xa, &(0x7f0000000400)=0x7, 0x4) recvmsg(r9, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r8}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x0, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) [ 1135.982916] xprt_adjust_timeout: rq_timeout = 0! [ 1136.004126] xprt_adjust_timeout: rq_timeout = 0! [ 1136.046519] xprt_adjust_timeout: rq_timeout = 0! [ 1136.072652] FAULT_INJECTION: forcing a failure. [ 1136.072652] name failslab, interval 1, probability 0, space 0, times 0 [ 1136.084210] CPU: 1 PID: 23190 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1136.091395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1136.100740] Call Trace: [ 1136.103332] dump_stack+0x194/0x24d [ 1136.106966] ? arch_local_irq_restore+0x53/0x53 [ 1136.111649] should_fail+0x8c0/0xa40 [ 1136.115358] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1136.120447] ? perf_trace_lock+0x900/0x900 [ 1136.124668] ? __lock_acquire+0x664/0x3e00 [ 1136.128890] ? find_held_lock+0x35/0x1d0 [ 1136.132935] ? __lock_is_held+0xb6/0x140 [ 1136.136981] ? check_same_owner+0x320/0x320 [ 1136.141278] ? __d_lookup+0x4f4/0x830 [ 1136.145061] ? rcu_note_context_switch+0x710/0x710 [ 1136.149975] should_failslab+0xec/0x120 [ 1136.153930] kmem_cache_alloc+0x47/0x760 [ 1136.157972] __d_alloc+0xc1/0xbd0 [ 1136.161406] ? shrink_dcache_for_umount+0x290/0x290 [ 1136.166398] ? d_alloc_parallel+0x1b40/0x1b40 [ 1136.170874] ? lock_release+0xa40/0xa40 [ 1136.174828] ? mark_held_locks+0xaf/0x100 [ 1136.178955] ? d_lookup+0x133/0x2e0 [ 1136.182563] ? d_lookup+0x1d5/0x2e0 [ 1136.186168] d_alloc+0x8e/0x340 [ 1136.189429] ? __d_alloc+0xbd0/0xbd0 [ 1136.193122] ? full_name_hash+0x9b/0xe0 [ 1136.197083] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 1136.202335] ? down_write_nested+0x8b/0x120 [ 1136.206632] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 1136.210846] ? _down_write_nest_lock+0x120/0x120 [ 1136.215581] ? rpc_d_lookup_sb+0x115/0x1a0 [ 1136.219791] ? lock_release+0xa40/0xa40 [ 1136.223745] rpc_mkpipe_dentry+0xf8/0x360 [ 1136.227938] nfs4blocklayout_register_sb+0x4b/0x70 [ 1136.232849] rpc_pipefs_event+0x3a4/0x480 [ 1136.236973] ? nfs4blocklayout_net_init+0x460/0x460 [ 1136.241965] ? lock_release+0xa40/0xa40 [ 1136.245932] ? dput.part.20+0x1d9/0x830 [ 1136.249886] notifier_call_chain+0x136/0x2c0 [ 1136.254275] ? unregister_die_notifier+0x20/0x20 [ 1136.259011] ? down_read+0x96/0x150 [ 1136.262621] ? blocking_notifier_call_chain+0xe1/0x190 [ 1136.267874] ? __down_interruptible+0x6b0/0x6b0 [ 1136.272521] ? _raw_spin_unlock+0x22/0x30 [ 1136.276648] blocking_notifier_call_chain+0x102/0x190 [ 1136.281815] ? srcu_init_notifier_head+0x80/0x80 [ 1136.286556] rpc_fill_super+0x525/0xae0 [ 1136.290512] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1136.295681] ? security_capable+0x8e/0xc0 [ 1136.299809] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1136.304975] ? ns_capable_common+0xcf/0x160 [ 1136.309274] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1136.314439] mount_ns+0xc4/0x190 [ 1136.317789] rpc_mount+0x9e/0xd0 [ 1136.321132] mount_fs+0x66/0x2d0 [ 1136.324477] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1136.329041] ? may_umount+0xa0/0xa0 [ 1136.332647] ? _raw_read_unlock+0x22/0x30 [ 1136.336770] ? __get_fs_type+0x8a/0xc0 [ 1136.340637] do_mount+0xea4/0x2bb0 [ 1136.344159] ? copy_mount_string+0x40/0x40 [ 1136.348373] ? rcu_pm_notify+0xc0/0xc0 [ 1136.352243] ? copy_mount_options+0x5f/0x2e0 [ 1136.356630] ? rcu_read_lock_sched_held+0x108/0x120 [ 1136.361622] ? kmem_cache_alloc_trace+0x459/0x740 [ 1136.366443] ? kasan_check_write+0x14/0x20 [ 1136.370656] ? _copy_from_user+0x99/0x110 [ 1136.374780] ? copy_mount_options+0x1f7/0x2e0 [ 1136.379254] SyS_mount+0xab/0x120 [ 1136.382685] ? copy_mnt_ns+0xb30/0xb30 [ 1136.386550] do_syscall_64+0x281/0x940 [ 1136.390415] ? vmalloc_sync_all+0x30/0x30 [ 1136.394539] ? _raw_spin_unlock_irq+0x27/0x70 [ 1136.399019] ? finish_task_switch+0x1c1/0x7e0 [ 1136.403496] ? syscall_return_slowpath+0x550/0x550 [ 1136.408401] ? syscall_return_slowpath+0x2ac/0x550 [ 1136.413306] ? prepare_exit_to_usermode+0x350/0x350 [ 1136.418300] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1136.423642] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1136.428464] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1136.433632] RIP: 0033:0x454e79 [ 1136.436797] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1136.444480] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1136.451727] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1136.458971] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1136.466216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1136.473459] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000053 [ 1136.499533] list_del corruption. prev->next should be 000000005f9a5b89, but was 000000002f5421ce [ 1136.509545] ------------[ cut here ]------------ [ 1136.514294] kernel BUG at lib/list_debug.c:53! [ 1136.518928] invalid opcode: 0000 [#1] SMP KASAN [ 1136.523583] Dumping ftrace buffer: [ 1136.527113] (ftrace buffer empty) [ 1136.531152] Modules linked in: [ 1136.534327] CPU: 1 PID: 23190 Comm: syz-executor4 Not tainted 4.16.0-rc7+ #7 [ 1136.541486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1136.550823] RIP: 0010:__list_del_entry_valid+0xef/0x150 [ 1136.556163] RSP: 0018:ffff8801b5cd77a0 EFLAGS: 00010282 [ 1136.561509] RAX: 0000000000000054 RBX: ffff8801773e3c80 RCX: 0000000000000000 [ 1136.568759] RDX: 0000000000000054 RSI: ffffc90008ef0000 RDI: ffffed0036b9aee8 [ 1136.576005] RBP: ffff8801b5cd77b8 R08: 1ffff10036b9ae40 R09: 0000000000000000 [ 1136.583255] R10: ffff8801b5cd7778 R11: 0000000000000000 R12: ffff8801773e3b00 [ 1136.590497] R13: 1ffff10036b9aefd R14: ffff8801773e3990 R15: dffffc0000000000 [ 1136.597741] FS: 00007f1334b82700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 1136.605938] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1136.611794] CR2: 00007f3664c9c6d4 CR3: 00000001b43b0003 CR4: 00000000001606e0 [ 1136.619040] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1136.626280] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1136.633522] Call Trace: [ 1136.636093] __dentry_kill+0x260/0x700 [ 1136.639954] ? check_and_drop+0x1b0/0x1b0 [ 1136.644079] ? d_path+0x930/0x930 [ 1136.647510] ? rcu_note_context_switch+0x710/0x710 [ 1136.652416] dput.part.20+0x5a0/0x830 [ 1136.656192] ? d_path+0x930/0x930 [ 1136.659618] ? rpc_show_info+0x460/0x460 [ 1136.663652] ? d_delete+0x181/0x280 [ 1136.667252] dput+0x1f/0x30 [ 1136.670161] rpc_fill_super+0x628/0xae0 [ 1136.674121] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1136.679303] ? security_capable+0x8e/0xc0 [ 1136.683444] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1136.688627] ? ns_capable_common+0xcf/0x160 [ 1136.692946] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 1136.698124] mount_ns+0xc4/0x190 [ 1136.701467] rpc_mount+0x9e/0xd0 [ 1136.704810] mount_fs+0x66/0x2d0 [ 1136.708162] vfs_kern_mount.part.26+0xc6/0x4a0 [ 1136.712718] ? may_umount+0xa0/0xa0 [ 1136.716333] ? _raw_read_unlock+0x22/0x30 [ 1136.720460] ? __get_fs_type+0x8a/0xc0 [ 1136.724322] do_mount+0xea4/0x2bb0 [ 1136.727836] ? copy_mount_string+0x40/0x40 [ 1136.732046] ? rcu_pm_notify+0xc0/0xc0 [ 1136.735910] ? copy_mount_options+0x5f/0x2e0 [ 1136.740293] ? rcu_read_lock_sched_held+0x108/0x120 [ 1136.745282] ? kmem_cache_alloc_trace+0x459/0x740 [ 1136.750099] ? kasan_check_write+0x14/0x20 [ 1136.754307] ? _copy_from_user+0x99/0x110 [ 1136.758432] ? copy_mount_options+0x1f7/0x2e0 [ 1136.762900] SyS_mount+0xab/0x120 [ 1136.766330] ? copy_mnt_ns+0xb30/0xb30 [ 1136.770197] do_syscall_64+0x281/0x940 [ 1136.774060] ? vmalloc_sync_all+0x30/0x30 [ 1136.778190] ? _raw_spin_unlock_irq+0x27/0x70 [ 1136.782667] ? finish_task_switch+0x1c1/0x7e0 [ 1136.787137] ? syscall_return_slowpath+0x550/0x550 [ 1136.792047] ? syscall_return_slowpath+0x2ac/0x550 [ 1136.796960] ? prepare_exit_to_usermode+0x350/0x350 [ 1136.801955] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 1136.807297] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1136.812128] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1136.817323] RIP: 0033:0x454e79 [ 1136.820496] RSP: 002b:00007f1334b81c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1136.828179] RAX: ffffffffffffffda RBX: 00007f1334b826d4 RCX: 0000000000454e79 [ 1136.835422] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 1136.842669] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 1136.849913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1136.857157] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000053 [ 1136.864406] Code: 4c 89 e2 48 c7 c7 40 b9 75 87 e8 55 12 48 fe 0f 0b 48 c7 c7 a0 b9 75 87 e8 47 12 48 fe 0f 0b 48 c7 c7 00 ba 75 87 e8 39 12 48 fe <0f> 0b 48 c7 c7 60 ba 75 87 e8 2b 12 48 fe 0f 0b 48 89 df 48 89 [ 1136.883570] RIP: __list_del_entry_valid+0xef/0x150 RSP: ffff8801b5cd77a0 [ 1136.890483] ---[ end trace dd13d53ab169e157 ]--- [ 1136.895256] Kernel panic - not syncing: Fatal exception [ 1136.900975] Dumping ftrace buffer: [ 1136.904496] (ftrace buffer empty) [ 1136.908178] Kernel Offset: disabled [ 1136.911779] Rebooting in 86400 seconds..