7a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) 2018/03/30 19:40:59 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r5, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r5, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r5, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r4}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r6}, 0x48) 2018/03/30 19:40:59 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, 0x0, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:40:59 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$kcm(0x29, 0x7, 0x0) socketpair(0x9, 0x80805, 0x8, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000340)=r1, 0x4) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x8, 0x80005, 0x3, &(0x7f0000000380)) socketpair(0x5, 0x801, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r2) recvmsg(r3, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 133.728078] autofs4:pid:9461:autofs4_fill_super: called with bogus options [ 133.738958] autofs4:pid:9466:autofs4_fill_super: called with bogus options 2018/03/30 19:40:59 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d") recvmsg(r4, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:40:59 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:40:59 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d") recvmsg(r4, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 134.049985] autofs4:pid:9491:autofs4_fill_super: called with bogus options 2018/03/30 19:41:00 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:00 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b80)={&(0x7f0000000940)='./file0\x00', 0x0, 0x8}, 0x10) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) recvmsg$kcm(r3, &(0x7f00000004c0)={&(0x7f0000000340)=@ipx, 0x80, &(0x7f0000000180)=[{&(0x7f00000009c0)=""/203, 0xcb}, {&(0x7f0000000ac0)=""/166, 0xa6}], 0x2, &(0x7f00000003c0)=""/48, 0x30, 0x4}, 0x0) [ 134.091965] autofs4:pid:9491:autofs4_fill_super: called with bogus options 2018/03/30 19:41:00 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec8") recvmsg(r4, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:00 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 134.323400] autofs4:pid:9509:autofs4_fill_super: called with bogus options [ 134.333917] autofs4:pid:9510:autofs4_fill_super: called with bogus options 2018/03/30 19:41:00 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000180)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:00 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec8") recvmsg(r4, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:00 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:00 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r5, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r5, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r5, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r4}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r6}, 0x48) 2018/03/30 19:41:00 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, 0x0, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:00 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, 0x0, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:00 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:00 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) [ 134.895859] autofs4:pid:9536:autofs4_fill_super: called with bogus options [ 134.912462] autofs4:pid:9540:autofs4_fill_super: called with bogus options 2018/03/30 19:41:00 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x100000) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000340)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000009c0)=""/118, 0x76}], 0x1, &(0x7f0000000a40)=""/79, 0x4f, 0x51e6}, 0x100) recvmsg$kcm(r0, &(0x7f0000000940)={&(0x7f0000000ac0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000b40)=""/141, 0x8d}, {&(0x7f0000000c00)=""/156, 0x9c}, {&(0x7f0000000cc0)=""/165, 0xa5}, {&(0x7f0000000d80)=""/88, 0x58}, {&(0x7f0000000e00)=""/228, 0xe4}, {&(0x7f0000000f00)=""/91, 0x5b}, {&(0x7f0000000f80)=""/73, 0x49}], 0x7, &(0x7f0000001080)=""/233, 0xe9}, 0x3) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0xfffffffffffffd34, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f000000dfc0)={&(0x7f000000dc80)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f000000dec0)=[{&(0x7f000000dd00)=""/214, 0xd6}, {&(0x7f000000de00)=""/130, 0x82}], 0x2, &(0x7f000000df00)=""/139, 0x8b, 0x9}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x7, &(0x7f0000001180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101}, [@exit={0x95}, @map={0x18, 0x0, 0x1, 0x0, r1}], {0x95}}, &(0x7f00000011c0)='GPL\x00', 0x0, 0x72, &(0x7f0000001200)=""/114, 0x41f00, 0x1, [], r4}, 0x48) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) recvmsg(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:00 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec8") recvmsg(r4, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:00 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:01 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b94") recvmsg(r4, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:01 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair(0x5, 0x2, 0x5, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x3ff) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) recvmsg(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:01 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:01 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b94") recvmsg(r4, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:01 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYBLOB="0600000062f8afeeee737387000000000000003e8f1c3169876eac70f1dcfa06b8b5fa77d4a3011eb83df658c19989cde8e99f50b415f696fabc4e85e6435a514a9bf5bf0accefafbb6998eab6b501642ed52b20aa710564652d34d640f7d9a0154e70f73eb695d797deff112565a1b11538d2aeee1a44570ad4801112c4cd95e3cf45114ca506061b1aaf8da2f51d2748c1b8769ca72dfe0706f27dbfd1ce7e2665cb4c2d58b184a9b638fbec6dc43f6a"]) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) recvmsg(r3, &(0x7f00000008c0)={&(0x7f0000000380)=@generic, 0x80, &(0x7f0000000440), 0x0, &(0x7f00000007c0)=""/222, 0x766}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file1\x00', 0x0, 0x18}, 0x10) [ 135.444644] autofs4:pid:9573:autofs4_fill_super: called with bogus options [ 135.469570] autofs4:pid:9579:autofs4_fill_super: called with bogus options [ 135.752288] autofs4:pid:9589:autofs4_fill_super: called with bogus options [ 135.762439] autofs4:pid:9591:autofs4_fill_super: called with bogus options 2018/03/30 19:41:01 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:01 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b94") recvmsg(r4, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:01 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000180)) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:01 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, 0x0, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) 2018/03/30 19:41:01 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:01 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r5, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r5, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r5, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r4}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r6}, 0x48) 2018/03/30 19:41:01 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:01 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, r0, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(0xffffffffffffffff) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:02 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449") recvmsg(r4, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:02 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='{utofs\x00', 0x0, &(0x7f00000009c0)="6753d7b5a4fd86a699e812097a1926a34d25fd64f30cde500f4f3739ad74697ddc3a8357a565bc8ddb1b7b0d7f8793faabd470d0f8275216f3d69ae452ef5adc413372b0a3dcdc925208b33a24652aad79a13d11dea777369b77180eb82df7b911468d8d2146a92d07ca0aa74ac100d3f64997437574992704845692b9c97506d0e2d9405391a04857a7d06dfe4534bf4837bf596f02a35655b3c5d3fc8f2123725a89d9a86305aea27bcd813812a1221398ba4a4fb84dce3619ac7ddc70fa930b9052abb374339134330ef299fb4f5881ffce8e") sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:02 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') [ 136.094365] autofs4:pid:9606:autofs4_fill_super: called with bogus options [ 136.118319] autofs4:pid:9616:autofs4_fill_super: called with bogus options 2018/03/30 19:41:02 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449") recvmsg(r4, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:02 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:02 executing program 6: socketpair(0x7, 0x4, 0x9b76, &(0x7f00000009c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) socketpair(0x3, 0x6, 0x6, &(0x7f0000000380)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) socketpair(0x5, 0x0, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f0000000180)='./file1\x00', r2}, 0x10) socketpair(0x0, 0xa, 0x3, &(0x7f0000000940)) 2018/03/30 19:41:02 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449") recvmsg(r4, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:02 executing program 5 (fault-call:18 fault-nth:0): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 136.794776] autofs4:pid:9649:autofs4_fill_super: called with bogus options [ 136.856918] autofs4:pid:9649:autofs4_fill_super: called with bogus options [ 136.959359] FAULT_INJECTION: forcing a failure. [ 136.959359] name failslab, interval 1, probability 0, space 0, times 0 [ 136.970759] CPU: 0 PID: 9667 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 136.977941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.987294] Call Trace: [ 136.989899] dump_stack+0x194/0x24d [ 136.993545] ? arch_local_irq_restore+0x53/0x53 [ 136.998230] should_fail+0x8c0/0xa40 [ 137.001951] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 137.007071] ? lock_downgrade+0x980/0x980 [ 137.011237] ? get_pid_task+0xbc/0x140 [ 137.015139] ? proc_fail_nth_write+0x9b/0x1d0 [ 137.019646] ? map_files_get_link+0x3a0/0x3a0 [ 137.024153] ? find_held_lock+0x35/0x1d0 [ 137.028261] ? check_same_owner+0x320/0x320 [ 137.032594] ? rcu_note_context_switch+0x710/0x710 [ 137.037552] should_failslab+0xec/0x120 [ 137.041545] __kmalloc_track_caller+0x5f/0x760 [ 137.046146] ? strncpy_from_user+0x430/0x430 [ 137.050557] ? strndup_user+0x62/0xb0 [ 137.054356] memdup_user+0x2c/0x90 [ 137.057888] strndup_user+0x62/0xb0 [ 137.061507] SyS_mount+0x3c/0x120 [ 137.064954] ? copy_mnt_ns+0xb30/0xb30 [ 137.068857] do_syscall_64+0x281/0x940 [ 137.072739] ? vmalloc_sync_all+0x30/0x30 [ 137.076881] ? _raw_spin_unlock_irq+0x27/0x70 [ 137.081364] ? finish_task_switch+0x1c1/0x7e0 [ 137.085846] ? syscall_return_slowpath+0x550/0x550 [ 137.090761] ? syscall_return_slowpath+0x2ac/0x550 [ 137.095673] ? prepare_exit_to_usermode+0x350/0x350 [ 137.100675] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 137.106042] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 137.110876] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 137.116048] RIP: 0033:0x454e79 [ 137.119217] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 137.126909] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 137.134160] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 137.141420] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 137.148690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 137.155964] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000000 2018/03/30 19:41:03 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:03 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x19, 0x3, 0xffffffff, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r2, &(0x7f0000000f40)={&(0x7f0000000340)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f00000009c0)=""/242, 0xf2}, {&(0x7f00000003c0)=""/24, 0x18}, {&(0x7f0000000ac0)=""/84, 0x54}, {&(0x7f0000000b40)=""/218, 0xda}, {&(0x7f00000004c0)=""/22, 0x16}, {&(0x7f0000000c40)=""/112, 0x70}, {&(0x7f0000000cc0)=""/239, 0xef}, {&(0x7f0000000940)=""/52, 0x34}], 0x8, &(0x7f0000000e40)=""/196, 0xc4}, 0x10100) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:03 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, 0x0, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) 2018/03/30 19:41:03 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:03 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:03 executing program 5 (fault-call:18 fault-nth:1): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:03 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:03 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, r0, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(0xffffffffffffffff) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:03 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 137.434276] autofs4:pid:9685:autofs4_fill_super: called with bogus options [ 137.474181] autofs4:pid:9698:autofs4_fill_super: called with bogus options 2018/03/30 19:41:03 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a80)='./file0\x00', &(0x7f0000001a40)='autofs\x00', 0x8000, &(0x7f00000003c0)="4f483e6ff0fcc084991f19145e167b7146b33802f92f09252ebc7a40e619") sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) socketpair(0x4, 0x80007, 0x8, &(0x7f0000000180)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f0000000340)=""/24, 0x18}, {&(0x7f0000001d00)=""/161, 0xa1}], 0x3, &(0x7f0000001dc0)=""/234, 0xea, 0x1a}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) recvmsg(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 137.559278] FAULT_INJECTION: forcing a failure. [ 137.559278] name failslab, interval 1, probability 0, space 0, times 0 [ 137.570632] CPU: 1 PID: 9702 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 137.577819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.587170] Call Trace: [ 137.589761] dump_stack+0x194/0x24d [ 137.593377] ? arch_local_irq_restore+0x53/0x53 [ 137.598039] ? __save_stack_trace+0x7e/0xd0 [ 137.602373] should_fail+0x8c0/0xa40 [ 137.606086] ? trace_event_raw_event_lock+0x340/0x340 [ 137.611277] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 137.616385] ? kasan_kmalloc+0xad/0xe0 [ 137.620282] ? __kmalloc_track_caller+0x15e/0x760 [ 137.625126] ? memdup_user+0x2c/0x90 [ 137.628833] ? strndup_user+0x62/0xb0 [ 137.632626] ? SyS_mount+0x3c/0x120 [ 137.636258] ? proc_fail_nth_write+0x9b/0x1d0 [ 137.640756] ? map_files_get_link+0x3a0/0x3a0 [ 137.645259] ? find_held_lock+0x35/0x1d0 [ 137.649342] ? check_same_owner+0x320/0x320 [ 137.653675] ? rcu_note_context_switch+0x710/0x710 [ 137.658612] ? __check_object_size+0x8b/0x530 [ 137.663113] should_failslab+0xec/0x120 [ 137.667090] __kmalloc_track_caller+0x5f/0x760 [ 137.671680] ? strncpy_from_user+0x430/0x430 [ 137.676090] ? strndup_user+0x62/0xb0 [ 137.679909] ? _copy_from_user+0x99/0x110 [ 137.684067] memdup_user+0x2c/0x90 [ 137.687613] strndup_user+0x62/0xb0 [ 137.691248] SyS_mount+0x6b/0x120 [ 137.694682] ? copy_mnt_ns+0xb30/0xb30 [ 137.698555] do_syscall_64+0x281/0x940 [ 137.702432] ? vmalloc_sync_all+0x30/0x30 [ 137.703260] autofs4:pid:9713:autofs4_fill_super: called with bogus options [ 137.706580] ? _raw_spin_unlock_irq+0x27/0x70 [ 137.706599] ? finish_task_switch+0x1c1/0x7e0 [ 137.706613] ? syscall_return_slowpath+0x550/0x550 [ 137.706625] ? syscall_return_slowpath+0x2ac/0x550 [ 137.706639] ? prepare_exit_to_usermode+0x350/0x350 [ 137.706653] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 137.706669] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 137.706684] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 137.706694] RIP: 0033:0x454e79 2018/03/30 19:41:03 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:03 executing program 6: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)='./file0\x00', &(0x7f0000001180)='gfs2\x00', 0x2001028, &(0x7f00000011c0)="1283d0fa76a50858bdb74bb167930d9af2f27109642ed82277a1afa5276339ba96f881408afcaa8d2fed5de76e62b4792e7ac3e73803c1ec1d488f520b3c0e3a74432215a32b914ca9f13837557d2662b7c5aee2a6bb60a082012514b484fbc5a5a953d057cc390c05703a8d50f762110e08fa070c25f585ca9821e8d781f46f5970568be018df7d4eac533e2c2e1cff8fd5ff903d84217a1f8dd46f82ac8ca62519ab7ad30b0c876281aa064d7ff5d5c4") sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000340)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f00000009c0)="2f5c9135b19bb2c71ff0567921efd3011ff65c1ca45ac1ab9c7fcb41f6ee8f68e74d09d40dd58d8c6b11ae571c7489bf1370cb02867669ffcb6286b78631e8101353a38cbeefacf48824353d0f1421f158c9898e20ca301d6891a0c547e11118a6b8b160a672757de8cb9c5338e3d35a292025a0e4368bc723b7e349411197155ab086619bd978e4ac52e7a2044271f3", 0x90}, {&(0x7f0000000a80)="8e555bf0fcd08051111310593ee36fd1612c4d957cd705e4b56d639b5a62cb6dd9e168e24a79e3a097dadae02f86c904ced8cc3d15660ec491072d359953d79fb0bb1f4e8446cb618b60b8ab5782982f022158ae6c17f129f4d73eccdcbb3e37007b088affb4f9ac72d72459e01ef05907f83be9edf853605a", 0x79}, {&(0x7f0000000b00)="004b90edd84d20b6cb2cf90cada83bac057becf5401f4fc79db081113502c5afe842358de4aab29df20bf3e0580cc5f25b844e4f40729e09e20ed27ad4a0461c738538c2f8f5ef074c6128e08469e98db88eb292e893c8", 0x57}, {&(0x7f0000000b80)="e72755afdcbae3dfd038cf65d2b0534e8a96d263a6de6a4753674a99549356a9de88232dc373f43f464342b0d3fef580a96f21314fb4366879f5d46c928e7bd20ecb7072a1a98de58b82fca8734f4a38c37eff514bb6687d70e9e724fa689bc207bb286d9871b297cbdd69d44af48bdcedd82d8d5578f04797afdc7d5925ea6f97c2b6bc5e4ce452cb7096f7467e929f61a519ea59fdfc6d8957fb24508a43839f110be6811e5a2c4674f235c0055040de4dd648b425dcc246803c71e70afc", 0xbf}, {&(0x7f00000003c0)="6fc4faf1991bcb56cd45544035c734a07eedd457d7f3c1242ff252bfc6a60119fc68c3166e2e644f380f66120c59234722561d802c2c8004b495542da6", 0x3d}, {&(0x7f0000000c40)="14801837fe8bd960b9ada9ee043722956b83a720f0d3a87347b786d839df86e0dbf6a780bac352f40767d8159cda0abfa8a9ebaae44aa4dd505996e63d91eda2753293566e5fc8585ad2bf5efbb359abef775c1137e98b9ffd313aad091ac1c0b6ab4a9ca5839a3bd799090dc5df9f278a2a720cb6d98249ad268eef35e6cd04c09a2a143059bb623ba3286bd3b515e6401813c7cf6ea523363a41f82393130f776689cf58bc9857cf55c4d505b96c8dfc82b2a3c15cff8ab30f", 0xba}, {&(0x7f0000000d00)="0d8c4265a7ed116750e25a75161d20ec2d065981ab08d04f5ba944724deefc477599e3344c92a8e1ab95a4d07d6367f3cdc851a5b512a9db9a3bc80f834092175e4ef6461b9a82b09dd72c7711f18de374e371b7b3202dc173aa90544dafeec83eccd4d3177db8a9e5a0bceaa9d49c318bd7d191d3bc4eb346ad1ed74256a84ab3a5bd1892237e8bf001be291613528bd545dd4fcb56b7fd40fc17560becba5226d07240d3452639cb1bc85bd8cd970d5e5c684b56880ff17a0fcbeea322335d", 0xc0}, {&(0x7f00000004c0)="897dafad58367fab19c88cefd661ed2b677774e1cb7ac867c23457", 0x1b}], 0x8, &(0x7f0000000e40)=[{0xc8, 0x6, 0x7, "715d5430a532e3b5476ecbd68d77b8d585c13a0940b779bf3ea17c734825ef4b1473f3ca671ce4c4b49968303ed47a67e0402af225f39b79111876f04461c52e9b40fc0fe2e3e642c5083944da667d01dea8032e277987b77d114bf0b7c1f92af9f4680f837676531cae8ed494f2e337d67a9a72f74d6374ee7148af26771b1f5a8e75e62193032ffd0501755204511081d961e11a9b265cf731d9eb8e3c7f652275126e0f51bdba570dc8043ae840feb71c81c2de"}, {0xc8, 0x114, 0x7fffffff, "881a5dd104b4dbbf894966ddc37b65170d748e0f135ea5d1ece53c4341fe09cab4cd03d2567b37cf38abda32279a573c8024886a2223d514f2dbcedca908383ad991c01c07166e0c6d53fa779b0fc2c19efcfd5162e0e0eccf082e8182d8135d581ffc12a349c53e9edec8069eba32a52596bda0f0f60c1aaa829e28ca68e8abc09ba265954d5e6e2f27ffb6095829949d4064324a23db09d5d917b0ab6335d5be77ffd283eb4e8d71e99e48736964ba86f87f1b1e"}, {0x70, 0x88, 0xfffffffffffffff8, "331930f0b090173a917b47f3f4b8f7c777c99e00c2d51eda79c8e13a4e07fae6fda625a9de44818ff42449d68efe371719a0eb8495aea2681b094d54e49ebd99ded6e49492b46b8fdc63a418b412fda50060186eaa80f27c198c"}, {0x48, 0x194, 0x3, "e4af8f31a8be7710ff90b24f77d2a44529fec6eb74f5c46c56a626483d3e4d9e7d74afab5ad02a993260057937f1e8cb08c16895dce093"}], 0x248, 0x80}, 0x40000) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000010c0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) recvmsg(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 137.747348] autofs4:pid:9716:autofs4_fill_super: called with bogus options [ 137.747676] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 137.747689] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 137.747698] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 137.785287] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 137.792564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 137.799840] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000001 2018/03/30 19:41:03 executing program 5 (fault-call:18 fault-nth:2): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:03 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x2, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 138.024335] autofs4:pid:9728:autofs4_fill_super: called with bogus options [ 138.052290] FAULT_INJECTION: forcing a failure. [ 138.052290] name failslab, interval 1, probability 0, space 0, times 0 [ 138.063696] CPU: 0 PID: 9729 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 138.070888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.080243] Call Trace: [ 138.082833] dump_stack+0x194/0x24d [ 138.086469] ? arch_local_irq_restore+0x53/0x53 [ 138.091143] should_fail+0x8c0/0xa40 [ 138.094868] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 138.099969] ? strndup_user+0x62/0xb0 [ 138.103764] ? SyS_mount+0x6b/0x120 [ 138.107390] ? trace_hardirqs_off+0x10/0x10 [ 138.111728] ? find_held_lock+0x35/0x1d0 [ 138.115842] ? check_same_owner+0x320/0x320 [ 138.120165] ? lock_release+0xa40/0xa40 [ 138.124193] ? rcu_note_context_switch+0x710/0x710 [ 138.129140] should_failslab+0xec/0x120 [ 138.133130] kmem_cache_alloc_trace+0x4b/0x740 [ 138.137720] ? kasan_check_write+0x14/0x20 [ 138.141957] ? _copy_from_user+0x99/0x110 [ 138.146110] copy_mount_options+0x5f/0x2e0 [ 138.150360] SyS_mount+0x87/0x120 [ 138.153817] ? copy_mnt_ns+0xb30/0xb30 [ 138.157712] do_syscall_64+0x281/0x940 [ 138.161592] ? vmalloc_sync_all+0x30/0x30 [ 138.165742] ? _raw_spin_unlock_irq+0x27/0x70 [ 138.170249] ? finish_task_switch+0x1c1/0x7e0 [ 138.174741] ? syscall_return_slowpath+0x550/0x550 [ 138.179674] ? syscall_return_slowpath+0x2ac/0x550 [ 138.184605] ? prepare_exit_to_usermode+0x350/0x350 [ 138.189629] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 138.195011] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 138.199867] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 138.205068] RIP: 0033:0x454e79 [ 138.208251] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 138.215961] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 2018/03/30 19:41:04 executing program 5 (fault-call:18 fault-nth:3): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:04 executing program 6: socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000980)={0xffffffffffffffff}) close(r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000b80)='./file0\x00', 0x13c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) r2 = gettid() r3 = perf_event_open(&(0x7f00000009c0)={0x2, 0x70, 0x4, 0x8, 0x6, 0x7, 0x0, 0x2, 0x12224, 0x1, 0x6, 0x2, 0x4b45, 0x101, 0x8, 0x4, 0xfffffffffffffffc, 0x8, 0x8e0, 0x9, 0x8, 0xfffffffffffffff9, 0x7fffffff, 0x9, 0x8001, 0x5e, 0x7f, 0x8, 0x80, 0x200, 0x0, 0x1, 0xffffffffffff67fe, 0x81, 0x7f, 0x7, 0x5, 0x7af, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000003c0), 0x8}, 0x8000, 0x1, 0xfffffffffffffffc, 0x7, 0x2, 0x64, 0xf3e9}, 0x0, 0x9, 0xffffffffffffff9c, 0x2) perf_event_open(&(0x7f0000000340)={0x3, 0x70, 0x200, 0x1, 0x401, 0x80, 0x0, 0xc74f, 0x4, 0xc, 0x1, 0x7, 0x32d, 0x9e7, 0x0, 0x101, 0x81, 0xff, 0xaf, 0x3, 0x5, 0x81, 0x0, 0x7f, 0x7, 0x6, 0x1, 0x3, 0x5, 0xfffffffffffffffb, 0xe0, 0x5, 0x6, 0x7ea3, 0x2, 0x6f68, 0x2, 0x2, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000180), 0x2}, 0x800, 0x9, 0x4, 0x7, 0x1, 0x800, 0x2}, r2, 0xc, r3, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000a40)={0xffffffffffffffff}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000a80)) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={r5, 0x50, &(0x7f0000000ac0)}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000940)={&(0x7f00000004c0)='./file1\x00', r6}, 0x10) recvmsg(r4, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 138.223234] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 138.230506] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 138.237781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 138.245049] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000002 [ 138.256926] autofs4:pid:9736:autofs4_fill_super: called with bogus options 2018/03/30 19:41:04 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:04 executing program 7: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, r0, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(0xffffffffffffffff) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:04 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:04 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, 0x0, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) 2018/03/30 19:41:04 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) [ 138.663259] FAULT_INJECTION: forcing a failure. [ 138.663259] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 138.675123] CPU: 1 PID: 9752 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 138.682321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.691677] Call Trace: [ 138.694274] dump_stack+0x194/0x24d [ 138.700789] ? arch_local_irq_restore+0x53/0x53 [ 138.705459] should_fail+0x8c0/0xa40 [ 138.709163] ? is_bpf_text_address+0x7b/0x120 [ 138.713646] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 138.718737] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 138.723924] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 138.729106] ? rcutorture_record_progress+0x10/0x10 [ 138.734107] ? is_bpf_text_address+0xa4/0x120 [ 138.738583] ? kernel_text_address+0xd1/0xe0 [ 138.742981] ? __unwind_start+0x169/0x330 [ 138.747124] ? __kernel_text_address+0xd/0x40 [ 138.751619] ? perf_trace_lock+0xd6/0x900 [ 138.755759] ? perf_trace_lock_acquire+0xe3/0x980 [ 138.760595] ? __save_stack_trace+0x7e/0xd0 [ 138.764915] ? trace_event_raw_event_lock+0x340/0x340 [ 138.770099] ? perf_trace_lock+0x900/0x900 [ 138.774323] ? trace_event_raw_event_lock+0x340/0x340 [ 138.779501] ? should_fail+0x23b/0xa40 [ 138.783374] ? perf_trace_lock+0x900/0x900 [ 138.787599] __alloc_pages_nodemask+0x327/0xdd0 [ 138.792269] ? trace_hardirqs_off+0x10/0x10 [ 138.796583] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 138.801623] ? find_held_lock+0x35/0x1d0 [ 138.805694] ? check_same_owner+0x320/0x320 [ 138.810004] ? lock_release+0xa40/0xa40 [ 138.813990] cache_grow_begin+0x72/0x640 [ 138.818063] kmem_cache_alloc_trace+0x3f1/0x740 [ 138.822733] ? kasan_check_write+0x14/0x20 [ 138.826969] copy_mount_options+0x5f/0x2e0 [ 138.831204] SyS_mount+0x87/0x120 [ 138.834638] ? copy_mnt_ns+0xb30/0xb30 [ 138.838511] do_syscall_64+0x281/0x940 [ 138.842387] ? vmalloc_sync_all+0x30/0x30 [ 138.846529] ? _raw_spin_unlock_irq+0x27/0x70 [ 138.851022] ? finish_task_switch+0x1c1/0x7e0 [ 138.855514] ? syscall_return_slowpath+0x550/0x550 [ 138.860435] ? syscall_return_slowpath+0x2ac/0x550 [ 138.865346] ? prepare_exit_to_usermode+0x350/0x350 [ 138.870341] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 138.875684] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 138.880506] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 138.885667] RIP: 0033:0x454e79 [ 138.888833] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 138.896523] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 138.903769] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 138.911017] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 138.918269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 138.925520] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000003 2018/03/30 19:41:05 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x2, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:05 executing program 6: socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000002200)={0x7, 0x70, 0x400, 0x9, 0x80, 0xffff, 0x0, 0x34, 0x50010, 0x4, 0x94a, 0x9, 0xb49, 0x0, 0x9, 0x795, 0x845, 0x5, 0x4, 0x0, 0x7, 0xfff, 0x5, 0x80000001, 0x5e, 0x0, 0x3, 0x9, 0x1ff, 0x55d6, 0x4, 0x101, 0x8, 0x80, 0xf252, 0xc3, 0x1, 0xfffffffffffffffa, 0x0, 0x40, 0x4, @perf_bp={&(0x7f00000021c0), 0xb}, 0x2, 0x0, 0x1f, 0x3, 0x8, 0x8, 0x7ff}, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002140)={0x4, 0x70, 0x1ff, 0x8, 0x9, 0x2, 0x0, 0x800, 0x0, 0x2, 0x7, 0x7, 0x7aa, 0x9, 0x6, 0x7fff, 0x2, 0x3f, 0x6, 0x5, 0xfffffffffffffff8, 0x81, 0x8000, 0x8, 0x2, 0x3, 0x5, 0x5, 0x0, 0x2, 0x0, 0x5, 0x5, 0xff, 0x45, 0x10000, 0x400, 0x7, 0x0, 0xdb09, 0x0, @perf_config_ext={0x100000000, 0x1000}, 0x20, 0x5, 0x0, 0x5, 0x3f, 0xba}, r1, 0xf, r2, 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00', 0x0, 0x1000000000}, 0x3f6) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r3}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f00000020c0)={&(0x7f0000000c80)=@in6={0x0, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000d00)=""/64, 0x40}, {&(0x7f0000000d40)=""/39, 0x27}, {&(0x7f0000000d80)=""/177, 0xb1}, {&(0x7f0000000e40)=""/196, 0xc4}, {&(0x7f0000000f40)=""/255, 0xff}], 0x5, &(0x7f00000010c0)=""/4096, 0x1000, 0x2}, 0x42) socketpair(0x1b, 0xa, 0x8001, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002c80)={&(0x7f0000002580)=@ethernet={0x307, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f0000002700)=[{&(0x7f0000002600)}, {&(0x7f0000002640)="d049ad482e41a1e4f582f9e4146cc9c97a44690576a54ec6043cb39ff0bed203ea9ebb6bfc6b31577d5a9788d26c4f63e6ef99839a37932eaf45e129b48ad35eb88af1dd81cb5a30edacf4eecf77b228d7f037ccc14c1e201c9f93d0002dbc1e9399031a87513c4d63abdcf0d39bb317a8f322cd0ac70a8a359036789e3871962c", 0x81}], 0x2, &(0x7f0000002740)=[{0x78, 0x13f, 0x2, "c23ad0f9f8b6d77d27ecbc850825ce60daf660d8b1916965e839818d17f9f3debc8266f7a94c5933774bd9b06becc3e450dc1024f7ffb7df514d87b74011517bf28bfdee9a188df590c562beeedc085dbace6b1212aef854237a2ad78f7a0f3df32ef58f0f161d5e"}, {0x28, 0x101, 0xfffffffffffffc00, "794d9ee469d38a20f5a2004c12aed8d7ecec5abd5f"}, {0xd8, 0x19a, 0x3, "79ccc72ab9da3fdb3d86d2208110fc746e222d42c57810bbf2dfe6ee90a9cbabe6610f64d897013e750810656f8e3ea096faafe62c15621f2886eaeb5045bc326d0ba7ec68ed363a23b53268d8009de32fdd1d58e86dd731dd5a30ac8e49881d9da765898882d21459e8fe1884b258e64e24e7ac3873552c97cfd216a843760d56353451a582c1d1ca5ae839ebad66bd579ed8a0d01fd481b76d0701ae80200c193680b662ca57415b4ddf261a88ca8535c6fe60db9591b0503053956866b58b91897469"}, {0x110, 0x1, 0x80, "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"}, {0x90, 0x29, 0x7, "9855aaea80b1e003b1c24d1d33607358142cf96be3551fb024bf8212df1536d35f4c629ae579d65528129b51a087e171b19f36dacb0e17b0e9aa4ce9bc1dd3d4c99c9d01795e82ecfdda15e70e7a9c1b7a0073c7679a9346a5a55c54b2682bf6d39bc9ee7917e959adaabed93c6070c9d65088ef5c60233bfc23de68"}, {0xa8, 0xbe, 0x3, "19fb3b998883542f2ec978793fa274bbcac95698440fe6cd8a4e519b66226ea5e974cb55b50ad1e97f82cc024123e68812f5468504c8af372e8c13e2436c36f3f74f168443cbdea7743f7a1eb9842524328720cb8322f98fabef52806ec35a1400aefeea41f6741ea233c67ff44819c3857b528a0e57e39e17d103bfef41594746b6e377baac1e17bb46f33de4d62d179d5a4f9bedee"}, {0x88, 0x117, 0x3ff, "2ead2c88b56d445c8aef10fc2c361891c1e2f2cc4332c3a342731eb516b2ad02b152425881a45eb3d0b5263cd9d977cf21082746801f14066f830c26b1d45c8b95893066b4aa49fb3d1ff9f834f5d1fdaf342a0b081fb0b4faf14f36d8ddd45fc6f3aa822d16ecc3368e2698fbc73fb59253ebe5dd580a"}, {0x68, 0x101, 0x6, "0d5b8054c166a20209699de29bb3b298072516b48c87f7bf97a0adfdb4700903532b3f1bf5c1b863c9aedffe331e6a991b5e9b8279da7f589d896a3840f155005f67e4444801e87f46ff30242a3781e2950f7ad8"}, {0x58, 0x10b, 0x3ff, "2b0f2a1fb126063b51230e46682ae63adca7979f636b25865a4b868a27a567652b44d2b64587fd74ccb082c9308602834af80a7194f4549b72ffec0e814518704d7e9a7b089d7c"}], 0x508, 0x2000c040}, 0x8890) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000900)={&(0x7f00000004c0)='./file1\x00', 0x0, 0x8}, 0x10) perf_event_open(&(0x7f0000000a80)={0x5, 0x70, 0x1ff, 0x0, 0x3, 0x3, 0x0, 0x6ada, 0x4718e2ab32ca578c, 0x8, 0x9, 0x8, 0x2, 0xec92, 0x442, 0x7, 0x2, 0x8, 0x0, 0x401, 0xfff, 0xfb, 0x0, 0x1f, 0xc3c4, 0x6, 0x0, 0x6, 0x8, 0x3, 0x4, 0xffffffffffffff00, 0x2, 0x4, 0x1, 0x3, 0x1, 0x5, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000940), 0x2}, 0x806, 0x540, 0x57e3, 0x7, 0x2, 0x390c, 0x800}, 0x0, 0x1, 0xffffffffffffff9c, 0xb72960499af787) socketpair(0x0, 0x8000a, 0x20, &(0x7f0000000b00)={0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002100)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002300)={r9, 0x50, &(0x7f0000002280)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002400)={r8, 0x50, &(0x7f0000002380)={0x0, 0x0}}, 0x10) r11 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440)=r10, 0xffffffffffffff71) r12 = perf_event_open(&(0x7f0000000b80)={0x4, 0x70, 0x5, 0x4, 0x5, 0x6, 0x0, 0x80, 0x51900, 0x8, 0x6, 0x200, 0x65, 0x9, 0x7de8, 0x1, 0x101, 0x10000, 0x0, 0xffffffffffff9b32, 0x214c, 0x1, 0x1, 0x8, 0x7ffd, 0x5, 0x4, 0x1ff, 0x4, 0x10000, 0x81, 0x7f, 0x172b36a7, 0x3, 0xff, 0x40000000000005, 0x1, 0x9, 0x0, 0x4, 0x4, @perf_config_ext={0x9, 0x8}, 0x800, 0x20, 0x2, 0x5, 0x7ff, 0x3, 0x7}, 0xffffffffffffffff, 0x5, r5, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r11) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000c00)={r4}) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='befs\x00', 0x2000000, &(0x7f00000009c0)="ac4c50aba111c8c7cb4a83b425052932c2f0a510577e14776e0ae9c0c15ce9cdf17f220410e1060ea8a71c392b49b1f3f9e910a04286cee2fa5cbd15f6437e85bee26e560db09f828d502dc818853dcd7e8152a039329e828ecfedce086c4241fa7bc2c6adf5dbfcf43f09759b20fa79a14677c05445331a9e52e679bb1f6af457f65bf715e066a859b9be1552898134c2d4556fbe216aab286fc52acfbffd19") recvmsg(r4, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r11) mount(&(0x7f0000000b40)='./file1\x00', &(0x7f0000002340)='./file2\x00', &(0x7f0000002480)='ext2\x00', 0x1, &(0x7f00000024c0)="89b217e086c34f7f83012d844cb9c088e93863a1c73efee70c71edea4f113ce84a62bf980c2a1362a9c1ca80de016d1bf32c968e40803c3c5d3d7e7a285ad4144452c26b8ad26f5d7fed47376b379a0029550e0dd0c39ea6228c335d2e520c68aae1f3623637ee7410cefea8fb44432998f04144ed73298ea2ef5bdc3765cacc1e9ac9b2227031c5d1a59c2d9ea682092efeacc37bc44c7c99cf50acfe28481978da8056e2e6d2") 2018/03/30 19:41:05 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x0, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:05 executing program 5 (fault-call:18 fault-nth:4): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:05 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:05 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:05 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:05 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) [ 140.096670] FAULT_INJECTION: forcing a failure. [ 140.096670] name failslab, interval 1, probability 0, space 0, times 0 [ 140.108132] CPU: 0 PID: 9792 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 140.115345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.124701] Call Trace: [ 140.127281] dump_stack+0x194/0x24d [ 140.130906] ? arch_local_irq_restore+0x53/0x53 [ 140.135589] should_fail+0x8c0/0xa40 [ 140.139310] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 140.144422] ? is_bpf_text_address+0xa4/0x120 [ 140.148915] ? find_held_lock+0x35/0x1d0 [ 140.152991] ? check_same_owner+0x320/0x320 [ 140.157314] ? filename_lookup+0x315/0x500 [ 140.161540] ? rcu_note_context_switch+0x710/0x710 [ 140.166456] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 140.171815] should_failslab+0xec/0x120 [ 140.175785] kmem_cache_alloc+0x47/0x760 [ 140.179849] alloc_vfsmnt+0xe0/0x9c0 [ 140.183546] ? path_lookupat+0x238/0xba0 [ 140.187605] ? mnt_free_id.isra.21+0x50/0x50 [ 140.192036] ? trace_hardirqs_off+0x10/0x10 [ 140.196362] ? putname+0xee/0x130 [ 140.199826] ? rcu_read_lock_sched_held+0x108/0x120 [ 140.204863] ? find_held_lock+0x35/0x1d0 [ 140.208926] ? __get_fs_type+0x8a/0xc0 [ 140.212820] ? lock_downgrade+0x980/0x980 [ 140.216973] ? module_unload_free+0x5b0/0x5b0 [ 140.221454] ? lock_release+0xa40/0xa40 [ 140.225420] ? mpi_resize+0x200/0x200 [ 140.229230] vfs_kern_mount.part.26+0x84/0x4a0 [ 140.233804] ? may_umount+0xa0/0xa0 [ 140.237419] ? _raw_read_unlock+0x22/0x30 [ 140.241560] ? __get_fs_type+0x8a/0xc0 [ 140.245459] do_mount+0xea4/0x2bb0 [ 140.248992] ? copy_mount_string+0x40/0x40 [ 140.253215] ? rcu_pm_notify+0xc0/0xc0 [ 140.257095] ? copy_mount_options+0x5f/0x2e0 [ 140.261488] ? rcu_read_lock_sched_held+0x108/0x120 [ 140.266501] ? kmem_cache_alloc_trace+0x459/0x740 [ 140.271362] ? copy_mount_options+0x1f7/0x2e0 [ 140.275872] SyS_mount+0xab/0x120 [ 140.279313] ? copy_mnt_ns+0xb30/0xb30 [ 140.283187] do_syscall_64+0x281/0x940 [ 140.287065] ? vmalloc_sync_all+0x30/0x30 [ 140.291207] ? _raw_spin_unlock_irq+0x27/0x70 [ 140.295695] ? finish_task_switch+0x1c1/0x7e0 [ 140.300175] ? syscall_return_slowpath+0x550/0x550 [ 140.305088] ? syscall_return_slowpath+0x2ac/0x550 [ 140.310005] ? prepare_exit_to_usermode+0x350/0x350 [ 140.315031] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 140.320409] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 140.325267] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 140.330447] RIP: 0033:0x454e79 [ 140.333637] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 140.341358] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 140.348620] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 140.355884] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 140.363146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 140.370408] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 2018/03/30 19:41:06 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x2, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:06 executing program 5 (fault-call:18 fault-nth:5): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 140.395986] autofs4:pid:9790:autofs4_fill_super: called with bogus options [ 140.507805] autofs4:pid:9811:autofs4_fill_super: called with bogus options 2018/03/30 19:41:06 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000900)=0x1f, 0x4) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x5, 0x8, &(0x7f0000000340)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x7, 0x7, 0x7, 0x0, 0x1b, 0xfffffffffffffffc}, @map={0x18, 0x8, 0x1, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0xe}], &(0x7f0000000380)='GPL\x00', 0x38, 0x0, &(0x7f00000003c0), 0x41100, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000004c0)={&(0x7f0000000180)='./file0\x00', r0}, 0x10) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x2, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r4) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) recvmsg(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 140.788555] FAULT_INJECTION: forcing a failure. [ 140.788555] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 140.800378] CPU: 1 PID: 9825 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 140.807543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.816874] Call Trace: [ 140.819443] dump_stack+0x194/0x24d [ 140.823062] ? arch_local_irq_restore+0x53/0x53 [ 140.827737] should_fail+0x8c0/0xa40 [ 140.828532] autofs4:pid:9828:autofs4_fill_super: called with bogus options [ 140.831448] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 140.831466] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 140.831480] ? trace_event_raw_event_lock+0x340/0x340 [ 140.831490] ? perf_trace_lock+0x900/0x900 [ 140.831502] ? print_irqtrace_events+0x270/0x270 [ 140.862398] autofs4:pid:9828:autofs4_fill_super: called with bogus options [ 140.862866] ? trace_hardirqs_off+0x10/0x10 [ 140.862883] ? lock_acquire+0x1d5/0x580 [ 140.878142] ? perf_trace_lock+0xd6/0x900 [ 140.882288] ? perf_trace_lock_acquire+0xe3/0x980 [ 140.887127] ? trace_event_raw_event_lock+0x340/0x340 [ 140.892321] ? perf_trace_lock+0x900/0x900 [ 140.896555] ? should_fail+0x23b/0xa40 [ 140.900443] __alloc_pages_nodemask+0x327/0xdd0 [ 140.905111] ? lock_release+0xa40/0xa40 [ 140.909078] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 140.914078] ? find_held_lock+0x35/0x1d0 [ 140.918148] ? check_same_owner+0x320/0x320 [ 140.922461] cache_grow_begin+0x72/0x640 [ 140.926514] kmem_cache_alloc+0x400/0x760 [ 140.930647] getname_flags+0xcb/0x580 [ 140.934430] user_path_at_empty+0x2d/0x50 [ 140.938558] do_mount+0x15f/0x2bb0 [ 140.942081] ? copy_mount_string+0x40/0x40 [ 140.946304] ? rcu_pm_notify+0xc0/0xc0 [ 140.950187] ? copy_mount_options+0x5f/0x2e0 [ 140.954583] ? rcu_read_lock_sched_held+0x108/0x120 [ 140.959593] ? kmem_cache_alloc_trace+0x459/0x740 [ 140.964432] ? kasan_check_write+0x14/0x20 [ 140.968660] ? copy_mount_options+0x1f7/0x2e0 [ 140.973146] SyS_mount+0xab/0x120 [ 140.976593] ? copy_mnt_ns+0xb30/0xb30 [ 140.980475] do_syscall_64+0x281/0x940 [ 140.984352] ? vmalloc_sync_all+0x30/0x30 [ 140.988493] ? _raw_spin_unlock_irq+0x27/0x70 [ 140.992984] ? finish_task_switch+0x1c1/0x7e0 [ 140.997478] ? syscall_return_slowpath+0x550/0x550 [ 141.002408] ? syscall_return_slowpath+0x2ac/0x550 [ 141.007328] ? prepare_exit_to_usermode+0x350/0x350 [ 141.012328] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 141.017672] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 141.022507] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 141.027682] RIP: 0033:0x454e79 [ 141.030847] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 141.038538] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 141.045801] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 141.053061] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 141.060320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 141.067573] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000005 2018/03/30 19:41:07 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r5}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) 2018/03/30 19:41:07 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x2, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:07 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={r0, 0x7fffffff, 0x10}, 0xc) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) recvmsg(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:07 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:07 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:07 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:07 executing program 5 (fault-call:18 fault-nth:6): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:07 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x0, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) [ 141.550463] FAULT_INJECTION: forcing a failure. [ 141.550463] name failslab, interval 1, probability 0, space 0, times 0 [ 141.550653] autofs4:pid:9855:autofs4_fill_super: called with bogus options [ 141.561826] CPU: 1 PID: 9849 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 141.561839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.585351] Call Trace: [ 141.585600] autofs4:pid:9861:autofs4_fill_super: called with bogus options [ 141.587935] dump_stack+0x194/0x24d [ 141.587951] ? arch_local_irq_restore+0x53/0x53 [ 141.587964] ? __unwind_start+0x169/0x330 [ 141.587987] should_fail+0x8c0/0xa40 [ 141.588000] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 141.588009] ? perf_trace_lock+0xd6/0x900 [ 141.588018] ? perf_trace_lock_acquire+0xe3/0x980 [ 141.588031] ? save_stack+0xa3/0xd0 [ 141.588040] ? trace_event_raw_event_lock+0x340/0x340 [ 141.588050] ? perf_trace_lock+0x900/0x900 [ 141.638186] ? do_mount+0xea4/0x2bb0 [ 141.641902] ? find_held_lock+0x35/0x1d0 [ 141.645983] ? check_same_owner+0x320/0x320 [ 141.650308] ? rcu_note_context_switch+0x710/0x710 [ 141.655238] should_failslab+0xec/0x120 [ 141.659214] __kmalloc_track_caller+0x5f/0x760 [ 141.663897] ? do_raw_spin_trylock+0x190/0x190 [ 141.668477] ? kstrdup_const+0x39/0x50 [ 141.672370] kstrdup+0x39/0x70 [ 141.675564] kstrdup_const+0x39/0x50 [ 141.679275] alloc_vfsmnt+0x1a5/0x9c0 [ 141.683067] ? path_lookupat+0x238/0xba0 [ 141.687109] ? mnt_free_id.isra.21+0x50/0x50 [ 141.691497] ? trace_hardirqs_off+0x10/0x10 [ 141.695810] ? putname+0xee/0x130 [ 141.699256] ? rcu_read_lock_sched_held+0x108/0x120 [ 141.704275] ? find_held_lock+0x35/0x1d0 [ 141.708344] ? __get_fs_type+0x8a/0xc0 [ 141.712231] ? lock_downgrade+0x980/0x980 [ 141.716376] ? module_unload_free+0x5b0/0x5b0 [ 141.720869] ? lock_release+0xa40/0xa40 [ 141.724834] ? mpi_resize+0x200/0x200 [ 141.728629] vfs_kern_mount.part.26+0x84/0x4a0 [ 141.733203] ? may_umount+0xa0/0xa0 [ 141.736808] ? _raw_read_unlock+0x22/0x30 [ 141.740935] ? __get_fs_type+0x8a/0xc0 [ 141.744804] do_mount+0xea4/0x2bb0 [ 141.748336] ? copy_mount_string+0x40/0x40 [ 141.752561] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 141.757570] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 141.762317] ? retint_kernel+0x10/0x10 [ 141.766194] ? copy_mount_options+0x18b/0x2e0 [ 141.770682] ? audit_kill_trees+0x430/0x430 [ 141.774997] ? copy_mount_options+0x1f7/0x2e0 [ 141.779487] SyS_mount+0xab/0x120 [ 141.782928] ? copy_mnt_ns+0xb30/0xb30 [ 141.786794] do_syscall_64+0x281/0x940 [ 141.790661] ? vmalloc_sync_all+0x30/0x30 [ 141.794810] ? _raw_spin_unlock_irq+0x27/0x70 [ 141.799299] ? finish_task_switch+0x1c1/0x7e0 [ 141.803780] ? syscall_return_slowpath+0x550/0x550 [ 141.808692] ? syscall_return_slowpath+0x2ac/0x550 [ 141.813615] ? prepare_exit_to_usermode+0x350/0x350 [ 141.818714] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 141.824075] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 141.828904] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 141.834072] RIP: 0033:0x454e79 [ 141.837241] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 19:41:07 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x2, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:07 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x4) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = getpid() socketpair(0x15, 0x4, 0xaf, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x6, 0x6, 0x200, 0x3f, 0x0, 0x1ff, 0x10000, 0x1, 0x4, 0x2, 0xfffffffffffffffd, 0x80, 0x79c9, 0x6, 0x1, 0x3f, 0x9, 0x4, 0x7fff, 0x6, 0x6f, 0x12b, 0x10001, 0x6, 0x7ff, 0x1a21, 0x2, 0x80000000, 0x6, 0x6, 0xffff, 0x4, 0xf6, 0x101, 0x8, 0xffffffff, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x20000, 0x23d7, 0x3, 0x7, 0x1, 0xfffffffffffffbff, 0x1000}, r0, 0x4, r1, 0xa) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000340)='./file0\x00', r2}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r2) recvmsg(r3, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 141.844945] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 141.852197] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 141.859448] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 141.866703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 141.873958] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 2018/03/30 19:41:07 executing program 5 (fault-call:18 fault-nth:7): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:07 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000380)="70efb0c39d36e6579bc48f0e13ff630dd8f9ab39777c4b88e938b12913fc8613c4769d8ae2dd7c1b5d34b10c19f258e0da99742e1e97e5756fa01bb540e627c3e0984fcfba4da8bc893808f2ed4706bf2d02c5d86f4fd8f1731e249c4017631f36e7e73c41cd3c00c9e8c7", 0x6b}, {&(0x7f00000004c0)="d7b8645e361d89a227b5d7e141418e3696a613cd09b43d6260c304c03eff8d0468b0ca3fbcaa1e94f3ed5eb8fb0fc90c4ccee5a351f9ec35b170141b80", 0x3d}], 0x2, &(0x7f00000009c0)=[{0x40, 0x119, 0x0, "a79ebd0ac2c05c6c31944f3d39628ce9aa69d91778d4a5c9350d2f40fa2af02a531c2a70aaf8e97ee47d0a762f"}, {0x80, 0x0, 0x2, "571a1a866e8b68bc7765e666e0d736b502af2937d317280f0342931e164e6a83fa647e4c31dafdd7cbc1299d8ea9ad0b61698c56285efd813a9085f762929658e53c697a4b543d17398804a817e01dd956b2d003d0de95462c09365c7070d604fee58237654d9cfb349203a10421b1"}, {0x108, 0x116, 0x8, "e7d872afe8fd35ccf5df82269436c455f808db61402cd47e6f0c1340bde539b9426f2c88d4ad7f12da365efc36c520319100746e4100b3fd003b6758ef86b684ea806893b2e7070a9a30110fab313fc38c6344e56da0e016662c9ee8729e486e71e12b17467e8292d46599efa7ea5bcb29f0a78f9c85f8ca9f593080a6f8ae8c32403c96e226a2d48b015e6b7c84f1c5417e545956b75db96cb9a41a57be1bd613695aad4e5e28245dad6f53fd20f54dc589a6a223f49f9261184d7cca3f3e4b77488963e5352fdfbbccdf64477028fd8a22861ddcb2dc34ce1aaf26dc54ddb8a055cc26a3d7ce15ffdeed978d201b0b6cf43fe7"}, {0x80, 0x10b, 0xa8d, "795a3cc9b0bf252b11705996aa7a6c6323fa9921af5edff16596ea0ad34f38d684f6be75dee0976164f31b565967d8d955a1f774c83552c05d21dccf15efebdea931f77908a5ea47422686f24c8ef439585a07d00ba44bb293304693197b055a9f45af56678c543de503"}, {0x108, 0x100, 0x0, "88bf10c86b0cacbcb09f982e89b3ab50db8585cf070afbc063a2cc20262d9b4ede356ce1d7d0430ecd7ddefbf3ee6975d702a9eb1a0b0564227a5603ba0817b7111f85908f42be91368381366ff380b99cc9455b96267dbcc4692e75cb65b4d3902e185ea04aeadb77b027a2dbbab2833c21344fe9a01db24511541d87bbacfed98cd1c52916c0afb6301f4d001355357aa24a082e5957c8a52cc921c2080804ead41128b1813ace5617e50bf25b858d3079949a486cb1ea28220dd73c7f9cd7dc4f3592676435d2b09d86710e36c512ce78c71ad4f8c36e79ca4982ee7fad52a88b34544dc7df26c7e7336766e941573c9d0084cdd82766"}, {0x98, 0x100, 0x1, "d4d698687da3e88062fe413c206ab1789a994726674272dce13199a2f7f5ac03d885c1365ff98277e88c4d88b9df8256e8d09cf2e77b744e910a413fd95b0955ed69d68a027da4ac90ec372fd14e963aa3f4ea297eeaa9ec02ac72deff8f05b267689f8c17cc766b509c6fb26148db7665b91abc0cc66fcc3cf1a6f6351169e0f68ded"}, {0x88, 0x11, 0x6, "340a0b27feea7e347c13e1a404f5a8f4a3374ad50c036356ab249606f0a412ab25ed3d33c990dd0816c9abf753a108910f38386a6448af496f4805c7e0c362a3632273a6f24e137ffef256eebb0a7bb0f645e4627229d340c2a0186cd963b4fb49bb770267b05f66bd2175d04253978a618362079b7cf2ea"}, {0x68, 0x10b, 0x1c, "4f646c37fd5c99f942e83ad897de18de7aadec5aa448441287cbcd0f42d3ee6eb5a9c2cd035de6ecce06dcc6a5e3c1b08efb33822f232d0f8dc99664e08488b271e242a6bb8d4a26607ea184ce33cad6554b6c5ff7"}, {0x80, 0x1, 0x100000000, "8a37366fa988d830193871c29d4db02611e24690eaff1b94ecaa38e4945fabe86c8ae2a7f9fa681a56251fdfc690ec1b2aac8e79c1f30d4a64263b659c745cd3131b679a89d468e90035666f7760f97e6b4c283028f2f1405c1ef57dc24392745a9fb4325067228e171cfe"}], 0x558, 0x8010}, 0x8040) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000340)={r0}) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001200)={r3}) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000001240)={r2}) recvmsg(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 141.976479] autofs4:pid:9867:autofs4_fill_super: called with bogus options [ 141.986547] autofs4:pid:9868:autofs4_fill_super: called with bogus options 2018/03/30 19:41:08 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x2, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 142.202291] FAULT_INJECTION: forcing a failure. [ 142.202291] name failslab, interval 1, probability 0, space 0, times 0 [ 142.213728] CPU: 0 PID: 9876 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 142.220933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.230283] Call Trace: [ 142.232888] dump_stack+0x194/0x24d [ 142.236512] ? arch_local_irq_restore+0x53/0x53 [ 142.241185] should_fail+0x8c0/0xa40 [ 142.244900] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 142.250016] ? perf_trace_lock+0x4d6/0x900 [ 142.254259] ? find_held_lock+0x35/0x1d0 [ 142.258374] ? check_same_owner+0x320/0x320 [ 142.262705] ? rcu_note_context_switch+0x710/0x710 [ 142.267630] ? find_held_lock+0x35/0x1d0 [ 142.271703] should_failslab+0xec/0x120 [ 142.275691] kmem_cache_alloc_trace+0x4b/0x740 [ 142.280274] ? lock_downgrade+0x980/0x980 [ 142.284411] ? lock_release+0xa40/0xa40 [ 142.288404] kernfs_mount_ns+0xb5/0x8b0 [ 142.292399] ? kernfs_super_ns+0x70/0x70 [ 142.296495] sysfs_mount+0xc2/0x1c0 [ 142.300141] ? sysfs_kill_sb+0x40/0x40 [ 142.304045] ? alloc_pages_current+0xbe/0x1e0 [ 142.308554] ? security_sb_copy_data+0x81/0xb0 [ 142.313136] mount_fs+0x66/0x2d0 [ 142.316497] vfs_kern_mount.part.26+0xc6/0x4a0 [ 142.321076] ? may_umount+0xa0/0xa0 [ 142.324702] ? _raw_read_unlock+0x22/0x30 [ 142.328852] ? __get_fs_type+0x8a/0xc0 [ 142.332751] do_mount+0xea4/0x2bb0 [ 142.336303] ? copy_mount_string+0x40/0x40 [ 142.340533] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 142.345550] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 142.350315] ? retint_kernel+0x10/0x10 [ 142.354206] ? copy_mount_options+0x18b/0x2e0 [ 142.358687] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 142.363530] ? copy_mount_options+0x1f7/0x2e0 [ 142.368051] SyS_mount+0xab/0x120 [ 142.371500] ? copy_mnt_ns+0xb30/0xb30 [ 142.375381] do_syscall_64+0x281/0x940 [ 142.379251] ? vmalloc_sync_all+0x30/0x30 [ 142.383388] ? _raw_spin_unlock_irq+0x27/0x70 [ 142.387891] ? finish_task_switch+0x1c1/0x7e0 [ 142.392385] ? syscall_return_slowpath+0x550/0x550 [ 142.397297] ? syscall_return_slowpath+0x2ac/0x550 [ 142.402210] ? prepare_exit_to_usermode+0x350/0x350 [ 142.407225] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 142.412598] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 142.417444] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 142.422616] RIP: 0033:0x454e79 [ 142.425795] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 142.433512] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 142.440788] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 2018/03/30 19:41:08 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:08 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:08 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) [ 142.448044] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 142.455299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 142.462557] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 [ 142.578341] autofs4:pid:9885:autofs4_fill_super: called with bogus options [ 142.596231] autofs4:pid:9886:autofs4_fill_super: called with bogus options 2018/03/30 19:41:08 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x0, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:08 executing program 5 (fault-call:18 fault-nth:8): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:08 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r5}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) 2018/03/30 19:41:08 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:08 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}], 0x2, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 142.903870] FAULT_INJECTION: forcing a failure. [ 142.903870] name failslab, interval 1, probability 0, space 0, times 0 [ 142.915250] CPU: 1 PID: 9905 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 142.922441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.931794] Call Trace: [ 142.934385] dump_stack+0x194/0x24d [ 142.938019] ? arch_local_irq_restore+0x53/0x53 [ 142.942693] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 142.947882] should_fail+0x8c0/0xa40 [ 142.951586] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 142.956687] ? perf_trace_lock+0xd6/0x900 [ 142.960826] ? perf_trace_lock_acquire+0xe3/0x980 [ 142.965678] ? find_held_lock+0x35/0x1d0 [ 142.969767] ? check_same_owner+0x320/0x320 [ 142.974094] ? rcu_note_context_switch+0x710/0x710 [ 142.979019] ? find_held_lock+0x35/0x1d0 [ 142.983067] should_failslab+0xec/0x120 [ 142.987029] kmem_cache_alloc_trace+0x4b/0x740 [ 142.991597] ? lock_downgrade+0x980/0x980 [ 142.995725] ? lock_release+0xa40/0xa40 [ 142.999681] kernfs_mount_ns+0xb5/0x8b0 [ 143.003633] ? kernfs_super_ns+0x70/0x70 [ 143.007674] sysfs_mount+0xc2/0x1c0 [ 143.011277] ? sysfs_kill_sb+0x40/0x40 [ 143.015141] ? alloc_pages_current+0xbe/0x1e0 [ 143.019613] ? security_sb_copy_data+0x81/0xb0 [ 143.024171] mount_fs+0x66/0x2d0 [ 143.027516] vfs_kern_mount.part.26+0xc6/0x4a0 [ 143.032072] ? may_umount+0xa0/0xa0 [ 143.035673] ? _raw_read_unlock+0x22/0x30 [ 143.039795] ? __get_fs_type+0x8a/0xc0 [ 143.043661] do_mount+0xea4/0x2bb0 [ 143.047182] ? copy_mount_string+0x40/0x40 [ 143.051393] ? rcu_pm_notify+0xc0/0xc0 [ 143.055263] ? copy_mount_options+0x5f/0x2e0 [ 143.059650] ? rcu_read_lock_sched_held+0x108/0x120 [ 143.064643] ? kmem_cache_alloc_trace+0x459/0x740 [ 143.069462] ? kasan_check_write+0x14/0x20 [ 143.073676] ? copy_mount_options+0x1f7/0x2e0 [ 143.078149] SyS_mount+0xab/0x120 [ 143.081575] ? copy_mnt_ns+0xb30/0xb30 [ 143.085440] do_syscall_64+0x281/0x940 [ 143.089300] ? vmalloc_sync_all+0x30/0x30 [ 143.093423] ? _raw_spin_unlock_irq+0x27/0x70 [ 143.097895] ? finish_task_switch+0x1c1/0x7e0 [ 143.102369] ? syscall_return_slowpath+0x550/0x550 [ 143.107273] ? syscall_return_slowpath+0x2ac/0x550 [ 143.112178] ? prepare_exit_to_usermode+0x350/0x350 [ 143.117173] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 143.122516] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 143.127338] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 143.132503] RIP: 0033:0x454e79 [ 143.135672] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 143.143356] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 143.150600] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 143.157845] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 143.165090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 143.172337] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 2018/03/30 19:41:09 executing program 5 (fault-call:18 fault-nth:9): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:09 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80a, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) mount(&(0x7f0000000180)='./file1\x00', &(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)='hugetlbfs\x00', 0x80, &(0x7f00000009c0)="83add3016d43b0e73afd4d8e7f005b578a37f89f4c7620c0f60c87477bab245e75ca885fbfdea538e44270ef9293c73a48167c7a1fd32d1b36534310f96dcfa30a4f18a585fa7c7dd0060ee17f397766746925f7ec77bdf06900d6d5616caa779e15ab435d4fb1142626bf1e97b8f7ab9cfa4d119819652c7a0e3b7cbaf4b1564ad43a9ca418d0bf3b70e32467e53dee61be7d4dc4ecb3d3ad736ae78ca8364843f1aa3cda767f285a89f9eaf6ecf43e2152ac7cb6fdaec75000cb8a10d103502e9136e948a74baa418270dcf19879aa4d83cb2ebedf552a495917254b7f34a7a015") recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 143.215875] autofs4:pid:9916:autofs4_fill_super: called with bogus options [ 143.226433] autofs4:pid:9916:autofs4_fill_super: called with bogus options 2018/03/30 19:41:09 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}], 0x2, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 143.454930] FAULT_INJECTION: forcing a failure. [ 143.454930] name failslab, interval 1, probability 0, space 0, times 0 [ 143.466340] CPU: 0 PID: 9926 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 143.473524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.482874] Call Trace: [ 143.485476] dump_stack+0x194/0x24d [ 143.489121] ? arch_local_irq_restore+0x53/0x53 [ 143.493807] should_fail+0x8c0/0xa40 [ 143.497519] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 143.502627] ? lock_release+0xa40/0xa40 [ 143.506602] ? find_held_lock+0x35/0x1d0 [ 143.510687] ? check_same_owner+0x320/0x320 [ 143.515011] ? sget_userns+0x27d/0xe40 [ 143.518912] ? rcu_note_context_switch+0x710/0x710 [ 143.523848] should_failslab+0xec/0x120 [ 143.527829] kmem_cache_alloc_trace+0x4b/0x740 [ 143.532405] ? sysfs_mount+0xc2/0x1c0 [ 143.536205] ? mount_fs+0x66/0x2d0 [ 143.539755] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 143.544518] ? do_mount+0xea4/0x2bb0 [ 143.548239] ? SyS_mount+0xab/0x120 [ 143.551883] ? do_syscall_64+0x281/0x940 [ 143.555968] sget_userns+0x2a3/0xe40 [ 143.559684] ? kernfs_sop_show_path+0x190/0x190 [ 143.564379] ? kernfs_sop_show_options+0x180/0x180 [ 143.569307] ? destroy_unused_super.part.6+0xd0/0xd0 [ 143.574436] ? check_same_owner+0x320/0x320 [ 143.578770] ? rcu_pm_notify+0xc0/0xc0 [ 143.582671] ? kernfs_mount_ns+0xb5/0x8b0 [ 143.586819] ? rcu_read_lock_sched_held+0x108/0x120 [ 143.591833] ? kmem_cache_alloc_trace+0x459/0x740 [ 143.596670] ? lock_downgrade+0x980/0x980 [ 143.600822] kernfs_mount_ns+0x13d/0x8b0 [ 143.604871] ? kernfs_super_ns+0x70/0x70 [ 143.608933] sysfs_mount+0xc2/0x1c0 [ 143.612548] ? sysfs_kill_sb+0x40/0x40 [ 143.616431] ? alloc_pages_current+0xbe/0x1e0 [ 143.620940] ? security_sb_copy_data+0x81/0xb0 [ 143.625513] mount_fs+0x66/0x2d0 [ 143.628868] vfs_kern_mount.part.26+0xc6/0x4a0 [ 143.633441] ? may_umount+0xa0/0xa0 [ 143.637065] ? _raw_read_unlock+0x22/0x30 [ 143.641205] ? __get_fs_type+0x8a/0xc0 [ 143.645101] do_mount+0xea4/0x2bb0 [ 143.648635] ? copy_mount_string+0x40/0x40 [ 143.652864] ? rcu_pm_notify+0xc0/0xc0 [ 143.656754] ? copy_mount_options+0x5f/0x2e0 [ 143.661171] ? rcu_read_lock_sched_held+0x108/0x120 [ 143.666186] ? kmem_cache_alloc_trace+0x459/0x740 [ 143.671044] ? kasan_check_write+0x14/0x20 [ 143.675283] ? copy_mount_options+0x1f7/0x2e0 [ 143.679867] SyS_mount+0xab/0x120 [ 143.683311] ? copy_mnt_ns+0xb30/0xb30 [ 143.687202] do_syscall_64+0x281/0x940 [ 143.691099] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 143.696639] ? syscall_return_slowpath+0x550/0x550 [ 143.701585] ? syscall_return_slowpath+0x2ac/0x550 [ 143.706537] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 143.711907] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 143.716748] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 143.721920] RIP: 0033:0x454e79 [ 143.725099] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 143.732806] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 143.740070] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 143.747331] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 143.754593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 143.761860] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 [ 143.911286] autofs4:pid:9936:autofs4_fill_super: called with bogus options [ 143.936607] hugetlbfs: Bad mount option: "ƒ­ÓmC°ç:ýMŽ" [ 143.943235] autofs4:pid:9940:autofs4_fill_super: called with bogus options [ 143.958188] hugetlbfs: Bad mount option: "ƒ­ÓmC°ç:ýMŽ" 2018/03/30 19:41:09 executing program 5 (fault-call:18 fault-nth:10): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:09 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x0, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:09 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) 2018/03/30 19:41:09 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r5}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) 2018/03/30 19:41:09 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:09 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, r0, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(0xffffffffffffffff) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:09 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}], 0x2, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:09 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) mkdir(&(0x7f0000000180)='./file1\x00', 0x100) [ 144.286615] FAULT_INJECTION: forcing a failure. [ 144.286615] name failslab, interval 1, probability 0, space 0, times 0 [ 144.298205] CPU: 1 PID: 9960 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 144.305376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.314709] Call Trace: [ 144.317280] dump_stack+0x194/0x24d [ 144.320892] ? arch_local_irq_restore+0x53/0x53 [ 144.325549] should_fail+0x8c0/0xa40 [ 144.329181] autofs4:pid:9971:autofs4_fill_super: called with bogus options [ 144.329251] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 144.341350] ? kasan_kmalloc+0xad/0xe0 [ 144.345238] ? __kmalloc+0x162/0x760 [ 144.346169] autofs4:pid:9973:autofs4_fill_super: called with bogus options [ 144.348940] ? __list_lru_init+0xcf/0x750 [ 144.348958] ? find_held_lock+0x35/0x1d0 [ 144.348975] ? __lock_is_held+0xb6/0x140 [ 144.348999] ? check_same_owner+0x320/0x320 [ 144.349015] ? rcu_note_context_switch+0x710/0x710 [ 144.349033] should_failslab+0xec/0x120 [ 144.349045] kmem_cache_alloc_node_trace+0x5a/0x760 [ 144.349055] ? mark_held_locks+0xaf/0x100 [ 144.349065] ? __raw_spin_lock_init+0x1c/0x100 [ 144.349079] __kmalloc_node+0x33/0x70 [ 144.398910] kvmalloc_node+0x99/0xd0 [ 144.402623] __list_lru_init+0x5d5/0x750 [ 144.406688] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 144.412564] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 144.417575] ? __lockdep_init_map+0xe4/0x650 [ 144.421983] ? lockdep_init_map+0x9/0x10 [ 144.426048] sget_userns+0x691/0xe40 [ 144.429757] ? kernfs_sop_show_path+0x190/0x190 [ 144.434424] ? kernfs_sop_show_options+0x180/0x180 [ 144.439351] ? destroy_unused_super.part.6+0xd0/0xd0 [ 144.444457] ? check_same_owner+0x320/0x320 [ 144.448774] ? rcu_pm_notify+0xc0/0xc0 [ 144.452657] ? rcu_read_lock_sched_held+0x108/0x120 [ 144.457664] ? kmem_cache_alloc_trace+0x459/0x740 [ 144.462503] ? lock_downgrade+0x980/0x980 [ 144.466656] kernfs_mount_ns+0x13d/0x8b0 [ 144.470719] ? kernfs_super_ns+0x70/0x70 [ 144.474786] sysfs_mount+0xc2/0x1c0 [ 144.478402] ? sysfs_kill_sb+0x40/0x40 [ 144.482295] ? alloc_pages_current+0xbe/0x1e0 [ 144.486796] ? security_sb_copy_data+0x81/0xb0 [ 144.491387] mount_fs+0x66/0x2d0 [ 144.494755] vfs_kern_mount.part.26+0xc6/0x4a0 [ 144.499334] ? may_umount+0xa0/0xa0 [ 144.502958] ? _raw_read_unlock+0x22/0x30 [ 144.507114] ? __get_fs_type+0x8a/0xc0 [ 144.511004] do_mount+0xea4/0x2bb0 [ 144.514547] ? copy_mount_string+0x40/0x40 [ 144.518776] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 144.523779] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 144.528528] ? retint_kernel+0x10/0x10 [ 144.532418] ? copy_mount_options+0x18b/0x2e0 2018/03/30 19:41:10 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) socketpair$inet6(0xa, 0x5, 0xffffffff, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000940)={&(0x7f0000001dc0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000003040)=[{&(0x7f0000001e40)=""/4096, 0x1000}, {&(0x7f0000002e40)=""/85, 0x55}, {&(0x7f0000002ec0)=""/108, 0x6c}, {&(0x7f0000002f40)=""/221, 0xdd}, {&(0x7f00000004c0)=""/45, 0x2d}], 0x5, &(0x7f00000030c0)=""/66, 0x42, 0xfffffffffffffff8}, 0x2002) sendmsg(r0, &(0x7f0000003680)={&(0x7f0000003140)=@ll={0x11, 0xd, r1, 0x1, 0x6, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80, &(0x7f00000033c0)=[{&(0x7f00000031c0)="ff934cc82b827beb7b712c7e8e8f3246e57f7d47bfa3b597054671eb647c8a86630cab5e416680e64d5329b551e558824e69b532594c5ebc19fe4c8f86a29f639a16ca1ba0076c4385358864b7df02898678e8e253710b9a641b332499a56c392ec69d59bf074528adce980d1a8b6beaa9a1c1ac8022e89fa3f8cc579be75736b831ca63c824238518cc006bc3b78037102b0fadd4106b14c901d4d841", 0x9d}, {&(0x7f0000003280)="39c6599266414e54f1b33c8e0d2a", 0xe}, {&(0x7f00000032c0)="2ee40a3d6d8b0893e626ddce8fe004b20adf0dc277f0f8fdf0baca68c71cac3607f0800d0d46b3aea56e9fb81e9d9f92ca29a131061952ccb284d5fc1672df4e6364dac2381d13183a7bed8142c006e7dc6ea17f327c8df2522a", 0x5a}, {&(0x7f0000003340)="c3a17b6fbf265e532a6e6467be5b6b04bf45c8d749c3609e5174dad908da153fdebb0886d99e0992a6dbbe3687f42fd2632db859c2a746552cef4ab55f92ef5fb93afd41b50edd7319ccb52d9303a4cc415c627cfcd6971001477fec1a", 0x5d}], 0x4, &(0x7f0000003400)=[{0x80, 0x6, 0x7, "b6297f43b50bd2357e4a08ec2a67f666ae6054d05c0a8a85748ee42b48e0f40c41e2f17fac7f03c2ed6001d8d3e48de20c5c9b616ce05311a5db91ce9f70b0a13ab2eb90d6618f2e2787d553ddfa13c81cc2b651ecfe4b294ec488a5c7d7f7b897387a115239ae63e09aab"}, {0x108, 0x110, 0x4, "03ffefb4c0a19120b5616a267b0c65baf5b12f1f60e52837a3538b73badc505d5ad3466eeba7df91ac6d872ad38117a338c41da2d6cb5fd42773ea96aae72c7bc5afb9b53b9a5215a72b0dea00f79065c406e1f23ca971985f2f9476be8318ec948a369381c0d22e5bf563a2222935ed8f41ab6b7cb32f9b40495aa59f9c48a0a9052f225bd08ea8627c54dfd0a4fc16f16047cc3ba36075534d1f29ad1daa65900935888763a38b3b931c28c0fabe10ea5a571a0b172e47c55fab0fad484f3405e2086879cc628a5f4bcc6f357e6836c6871377aa4a48cbfc660e096141f7133ea4fa9c48b2f2c0fc7fbcc0493fab56f4e4caa3c4"}, {0xd0, 0x11, 0x6, "5b00291e3a1926971be2477f1c409928b8afbe04d3c7f560afcae70ef4d068c960566d323f3d4a673f571cad90f8fec370368338a2d64eef59ea70ba30fe1acc7e085d032de4be820166c5a780f8dd5e95d2ea6567d752db2c1c3e485c140453c443ea9a02f8651bf8d5fc39f2cc93d19c5368810b795487a7af9cfd74961faf1b8817b29f6f0df822efc29e9c8413030307fc1409ef6823a7d76bc21ba554aa7d05f106a02688432a3a145ce0c5046b53325abfdb98b540bd653381"}], 0x258, 0x4000000}, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x17, 0x7, 0x5, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x2, 0xd, &(0x7f00000009c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, [@exit={0x95}, @ldst={0x2, 0x3, 0x7, 0x2, 0x6, 0xfffffffe, 0xffffffffffffffff}, @ldst={0x0, 0x1, 0x0, 0x7, 0x9, 0x58, 0xffffffffffffffff}, @map={0x18, 0x7, 0x1, 0x0, 0xffffffffffffff9c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffffb}], {0x95}}, &(0x7f00000003c0)='syzkaller\x00', 0x3f, 0x54, &(0x7f0000000a40)=""/84, 0x41f00, 0x1, [], r1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) recvmsg(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)={0xb, 0x1, 0x0, 0xfffffffffffffffb, 0x4, r4, 0x5}, 0x2c) mount(&(0x7f0000000100)='./file1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000340)='pstore\x00', 0x3044004, &(0x7f0000000380)) [ 144.536913] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 144.541754] ? copy_mount_options+0x1f7/0x2e0 [ 144.546258] SyS_mount+0xab/0x120 [ 144.549708] ? copy_mnt_ns+0xb30/0xb30 [ 144.549808] autofs4:pid:9977:autofs4_fill_super: called with bogus options [ 144.553590] do_syscall_64+0x281/0x940 [ 144.553600] ? vmalloc_sync_all+0x30/0x30 [ 144.553611] ? _raw_spin_unlock_irq+0x27/0x70 [ 144.553625] ? finish_task_switch+0x1c1/0x7e0 [ 144.553637] ? syscall_return_slowpath+0x550/0x550 [ 144.553648] ? syscall_return_slowpath+0x2ac/0x550 [ 144.553659] ? prepare_exit_to_usermode+0x350/0x350 [ 144.553670] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 144.553685] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 144.553702] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 144.553711] RIP: 0033:0x454e79 [ 144.553717] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 144.553728] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 144.553733] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 2018/03/30 19:41:10 executing program 5 (fault-call:18 fault-nth:11): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:10 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) socketpair(0x24d7ba4e62b9918a, 0x801, 0x8000, &(0x7f0000000180)) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 144.553739] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 144.553749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 144.581391] autofs4:pid:9979:autofs4_fill_super: called with bogus options [ 144.582600] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a 2018/03/30 19:41:10 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 144.918250] FAULT_INJECTION: forcing a failure. [ 144.918250] name failslab, interval 1, probability 0, space 0, times 0 [ 144.929632] CPU: 0 PID: 9989 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 144.936830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.946193] Call Trace: [ 144.948795] dump_stack+0x194/0x24d [ 144.952443] ? arch_local_irq_restore+0x53/0x53 [ 144.957126] should_fail+0x8c0/0xa40 [ 144.960837] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 144.965944] ? __kernel_text_address+0xd/0x40 [ 144.970459] ? unwind_get_return_address+0x61/0xa0 [ 144.975431] ? find_held_lock+0x35/0x1d0 [ 144.979519] ? __lock_is_held+0xb6/0x140 [ 144.983597] ? check_same_owner+0x320/0x320 [ 144.987914] ? rcu_note_context_switch+0x710/0x710 [ 144.992867] should_failslab+0xec/0x120 [ 144.996839] kmem_cache_alloc_trace+0x4b/0x740 [ 145.001446] ? __kmalloc_node+0x33/0x70 [ 145.005428] ? __kmalloc_node+0x33/0x70 [ 145.009418] ? rcu_read_lock_sched_held+0x108/0x120 [ 145.014434] __memcg_init_list_lru_node+0x169/0x270 [ 145.019464] ? list_lru_add+0x7c0/0x7c0 [ 145.023448] ? __kmalloc_node+0x47/0x70 [ 145.027450] __list_lru_init+0x544/0x750 [ 145.031516] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 145.037400] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 145.042409] ? __lockdep_init_map+0xe4/0x650 [ 145.046813] ? lockdep_init_map+0x9/0x10 [ 145.050886] sget_userns+0x691/0xe40 [ 145.054605] ? kernfs_sop_show_path+0x190/0x190 [ 145.059296] ? kernfs_sop_show_options+0x180/0x180 [ 145.064237] ? destroy_unused_super.part.6+0xd0/0xd0 [ 145.069371] ? check_same_owner+0x320/0x320 [ 145.073705] ? rcu_pm_notify+0xc0/0xc0 [ 145.077599] ? rcu_read_lock_sched_held+0x108/0x120 [ 145.082618] ? kmem_cache_alloc_trace+0x459/0x740 [ 145.087451] ? lock_downgrade+0x980/0x980 [ 145.091596] kernfs_mount_ns+0x13d/0x8b0 [ 145.095673] ? kernfs_super_ns+0x70/0x70 [ 145.099745] sysfs_mount+0xc2/0x1c0 [ 145.103358] ? sysfs_kill_sb+0x40/0x40 [ 145.107246] ? alloc_pages_current+0xbe/0x1e0 [ 145.111738] ? security_sb_copy_data+0x81/0xb0 [ 145.116320] mount_fs+0x66/0x2d0 [ 145.119699] vfs_kern_mount.part.26+0xc6/0x4a0 [ 145.124293] ? may_umount+0xa0/0xa0 [ 145.127928] ? _raw_read_unlock+0x22/0x30 [ 145.132087] ? __get_fs_type+0x8a/0xc0 [ 145.135993] do_mount+0xea4/0x2bb0 [ 145.139530] ? copy_mount_string+0x40/0x40 [ 145.143757] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 145.148765] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 145.153518] ? retint_kernel+0x10/0x10 [ 145.157418] ? copy_mount_options+0x18b/0x2e0 [ 145.161902] ? copy_mount_options+0x193/0x2e0 [ 145.166388] ? copy_mount_options+0x1f7/0x2e0 [ 145.170894] SyS_mount+0xab/0x120 [ 145.174331] ? copy_mnt_ns+0xb30/0xb30 [ 145.178213] do_syscall_64+0x281/0x940 [ 145.182097] ? vmalloc_sync_all+0x30/0x30 [ 145.186247] ? finish_task_switch+0x1c1/0x7e0 [ 145.190753] ? syscall_return_slowpath+0x550/0x550 [ 145.195689] ? syscall_return_slowpath+0x2ac/0x550 [ 145.200620] ? prepare_exit_to_usermode+0x350/0x350 [ 145.205638] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 145.211007] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/30 19:41:10 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) [ 145.215871] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 145.221063] RIP: 0033:0x454e79 [ 145.224239] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 145.231941] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 145.239198] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 145.246459] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 145.253715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 145.260967] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b [ 145.280177] autofs4:pid:9994:autofs4_fill_super: called with bogus options [ 145.320493] autofs4:pid:9994:autofs4_fill_super: called with bogus options 2018/03/30 19:41:12 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:12 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:12 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:12 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:12 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x0, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:12 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) 2018/03/30 19:41:12 executing program 5 (fault-call:18 fault-nth:12): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:12 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x40) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) mkdir(&(0x7f0000000180)='./file1/file0\x00', 0x4) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:12 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 146.562476] autofs4:pid:10028:autofs4_fill_super: called with bogus options [ 146.584636] autofs4:pid:10036:autofs4_fill_super: called with bogus options [ 146.613255] FAULT_INJECTION: forcing a failure. [ 146.613255] name failslab, interval 1, probability 0, space 0, times 0 [ 146.624656] CPU: 0 PID: 10030 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 146.631941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.641306] Call Trace: [ 146.643906] dump_stack+0x194/0x24d [ 146.647534] ? arch_local_irq_restore+0x53/0x53 [ 146.652224] should_fail+0x8c0/0xa40 [ 146.655931] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 146.661035] ? kasan_kmalloc+0xad/0xe0 [ 146.664911] ? kmem_cache_alloc_trace+0x136/0x740 [ 146.669757] ? __memcg_init_list_lru_node+0x169/0x270 [ 146.674943] ? sget_userns+0x691/0xe40 [ 146.678823] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 146.683561] ? do_mount+0xea4/0x2bb0 [ 146.687270] ? SyS_mount+0xab/0x120 [ 146.690894] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 146.696269] ? find_held_lock+0x35/0x1d0 [ 146.700323] ? __lock_is_held+0xb6/0x140 [ 146.704387] ? check_same_owner+0x320/0x320 [ 146.708698] ? rcu_note_context_switch+0x710/0x710 [ 146.713628] should_failslab+0xec/0x120 [ 146.717606] kmem_cache_alloc_trace+0x4b/0x740 [ 146.722176] ? __kmalloc_node+0x33/0x70 [ 146.726139] ? __kmalloc_node+0x33/0x70 [ 146.730098] ? rcu_read_lock_sched_held+0x108/0x120 [ 146.735125] __memcg_init_list_lru_node+0x169/0x270 [ 146.740140] ? list_lru_add+0x7c0/0x7c0 [ 146.744108] ? __kmalloc_node+0x47/0x70 [ 146.748088] __list_lru_init+0x544/0x750 [ 146.752137] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 146.758020] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 146.763042] ? __lockdep_init_map+0xe4/0x650 [ 146.767462] ? lockdep_init_map+0x9/0x10 [ 146.771524] sget_userns+0x691/0xe40 [ 146.775229] ? kernfs_sop_show_path+0x190/0x190 [ 146.779903] ? kernfs_sop_show_options+0x180/0x180 [ 146.784823] ? destroy_unused_super.part.6+0xd0/0xd0 [ 146.789924] ? check_same_owner+0x320/0x320 [ 146.794233] ? rcu_pm_notify+0xc0/0xc0 [ 146.798118] ? rcu_read_lock_sched_held+0x108/0x120 [ 146.803116] ? kmem_cache_alloc_trace+0x459/0x740 [ 146.807940] ? lock_downgrade+0x980/0x980 [ 146.812082] kernfs_mount_ns+0x13d/0x8b0 [ 146.816146] ? kernfs_super_ns+0x70/0x70 [ 146.820229] sysfs_mount+0xc2/0x1c0 [ 146.823846] ? sysfs_kill_sb+0x40/0x40 [ 146.827721] ? alloc_pages_current+0xbe/0x1e0 [ 146.832218] ? security_sb_copy_data+0x81/0xb0 [ 146.836799] mount_fs+0x66/0x2d0 [ 146.840152] vfs_kern_mount.part.26+0xc6/0x4a0 [ 146.844731] ? may_umount+0xa0/0xa0 [ 146.848354] ? _raw_read_unlock+0x22/0x30 [ 146.852486] ? __get_fs_type+0x8a/0xc0 [ 146.856372] do_mount+0xea4/0x2bb0 [ 146.859914] ? copy_mount_string+0x40/0x40 [ 146.864130] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 146.869136] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 146.873888] ? retint_kernel+0x10/0x10 [ 146.877768] ? copy_mount_options+0x149/0x2e0 [ 146.882266] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 146.887104] ? copy_mount_options+0x1f7/0x2e0 [ 146.891589] SyS_mount+0xab/0x120 [ 146.895034] ? copy_mnt_ns+0xb30/0xb30 [ 146.898919] do_syscall_64+0x281/0x940 [ 146.902799] ? vmalloc_sync_all+0x30/0x30 [ 146.906929] ? _raw_spin_unlock_irq+0x27/0x70 [ 146.911408] ? finish_task_switch+0x1c1/0x7e0 [ 146.915886] ? syscall_return_slowpath+0x550/0x550 [ 146.920809] ? syscall_return_slowpath+0x2ac/0x550 [ 146.925723] ? prepare_exit_to_usermode+0x350/0x350 [ 146.930725] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 146.936080] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 146.940936] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 146.946121] RIP: 0033:0x454e79 [ 146.949299] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 146.957022] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 2018/03/30 19:41:12 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1b, 0x3, 0x0, 0x1dc, 0x1, 0xffffffffffffff9c, 0x6}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000940)={&(0x7f00000003c0)='./file0\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) close(r2) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)={&(0x7f0000000a40)='./file0/file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r3}, 0x10) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='logfs\x00', 0x908800, &(0x7f00000009c0)="f4ddb2cf3a934497a8056b50aca38ac0c4eb522bb449a111707a6898dbb399a819b7dfb79b0df0bfeb660b0941ff722626b695f31a63c3f484929507ef7c258da49a4c00d4919806bffe27139da4a10f8927aee3f07279d7a281") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r3) recvmsg(r4, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:12 executing program 5 (fault-call:18 fault-nth:13): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 146.964294] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 146.971552] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 146.978819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 146.986079] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c [ 147.387215] FAULT_INJECTION: forcing a failure. [ 147.387215] name failslab, interval 1, probability 0, space 0, times 0 [ 147.398548] CPU: 1 PID: 10053 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 147.405815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.415155] Call Trace: [ 147.417731] dump_stack+0x194/0x24d [ 147.421357] ? arch_local_irq_restore+0x53/0x53 [ 147.426034] should_fail+0x8c0/0xa40 [ 147.429746] ? is_bpf_text_address+0xa4/0x120 [ 147.434242] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 147.439344] ? __kernel_text_address+0xd/0x40 [ 147.443870] ? unwind_get_return_address+0x61/0xa0 [ 147.448809] ? find_held_lock+0x35/0x1d0 [ 147.452876] ? __lock_is_held+0xb6/0x140 [ 147.456946] ? check_same_owner+0x320/0x320 [ 147.461268] ? rcu_note_context_switch+0x710/0x710 [ 147.466199] should_failslab+0xec/0x120 [ 147.470173] kmem_cache_alloc_trace+0x4b/0x740 [ 147.474745] ? __kmalloc_node+0x33/0x70 [ 147.478699] ? __kmalloc_node+0x33/0x70 [ 147.482654] ? rcu_read_lock_sched_held+0x108/0x120 [ 147.487667] __memcg_init_list_lru_node+0x169/0x270 [ 147.492687] ? list_lru_add+0x7c0/0x7c0 [ 147.496651] ? __kmalloc_node+0x47/0x70 [ 147.500613] __list_lru_init+0x544/0x750 [ 147.504663] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 147.510540] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 147.515547] ? __lockdep_init_map+0xe4/0x650 [ 147.519956] ? lockdep_init_map+0x9/0x10 [ 147.524011] sget_userns+0x691/0xe40 [ 147.527719] ? kernfs_sop_show_path+0x190/0x190 [ 147.532391] ? kernfs_sop_show_options+0x180/0x180 [ 147.537324] ? destroy_unused_super.part.6+0xd0/0xd0 [ 147.542417] ? check_same_owner+0x320/0x320 [ 147.546718] ? rcu_pm_notify+0xc0/0xc0 [ 147.550601] ? rcu_read_lock_sched_held+0x108/0x120 [ 147.555601] ? kmem_cache_alloc_trace+0x459/0x740 [ 147.560430] ? lock_downgrade+0x980/0x980 [ 147.564585] kernfs_mount_ns+0x13d/0x8b0 [ 147.568635] ? kernfs_super_ns+0x70/0x70 [ 147.572679] sysfs_mount+0xc2/0x1c0 [ 147.576291] ? sysfs_kill_sb+0x40/0x40 [ 147.580178] ? alloc_pages_current+0xbe/0x1e0 [ 147.584673] ? security_sb_copy_data+0x81/0xb0 [ 147.589251] mount_fs+0x66/0x2d0 [ 147.592617] vfs_kern_mount.part.26+0xc6/0x4a0 [ 147.597192] ? may_umount+0xa0/0xa0 [ 147.600813] ? _raw_read_unlock+0x22/0x30 [ 147.604960] ? __get_fs_type+0x8a/0xc0 [ 147.608852] do_mount+0xea4/0x2bb0 [ 147.612397] ? copy_mount_string+0x40/0x40 [ 147.616626] ? rcu_pm_notify+0xc0/0xc0 [ 147.620503] ? copy_mount_options+0x5f/0x2e0 [ 147.624887] ? rcu_read_lock_sched_held+0x108/0x120 [ 147.629886] ? kmem_cache_alloc_trace+0x459/0x740 [ 147.634709] ? kasan_check_write+0x14/0x20 [ 147.638920] ? copy_mount_options+0x1f7/0x2e0 [ 147.643392] SyS_mount+0xab/0x120 [ 147.646819] ? copy_mnt_ns+0xb30/0xb30 [ 147.650694] do_syscall_64+0x281/0x940 [ 147.654569] ? vmalloc_sync_all+0x30/0x30 [ 147.658698] ? _raw_spin_unlock_irq+0x27/0x70 [ 147.663169] ? finish_task_switch+0x1c1/0x7e0 [ 147.667639] ? syscall_return_slowpath+0x550/0x550 [ 147.672544] ? syscall_return_slowpath+0x2ac/0x550 [ 147.677450] ? prepare_exit_to_usermode+0x350/0x350 [ 147.682444] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 147.687787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 147.692620] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 147.697792] RIP: 0033:0x454e79 [ 147.700954] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 147.708637] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 147.715892] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 147.723156] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 147.730406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 147.737660] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d [ 147.755183] autofs4:pid:10054:autofs4_fill_super: called with bogus options [ 147.806314] autofs4:pid:10059:autofs4_fill_super: called with bogus options 2018/03/30 19:41:13 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:13 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:13 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:13 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:13 executing program 5 (fault-call:18 fault-nth:14): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:13 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, r0, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(0xffffffffffffffff) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) 2018/03/30 19:41:13 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:13 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f00000009c0)="69c80aa7e400370b16cf2d43bc8ed710f2febd522fe7726737c9355c75642c0033f157342dc22bf06ef75a29d7f0b8bd62837afbdd09e824eab624f5ea3510a1d591ed4ea299ef105c998e34b114fd52d31cc9ef7faf4346c9960f3d15a16fe0ea98d259363e3c13c69661fb4c138777f70bded75afe7491f3860ed4f2f52887a8b52b80fab9d307aa8177115efb6d6b89ab3ea5cf871b344520460167c19a1534d0a4a0b5158813d536ba353b4922b725b21e4597b876e97aa0a1fc2cfcb77878", &(0x7f0000000340)="1c228538369fbe653b5f85764f8290b920167c9adff1811659d7f36680bcbe87987db19147e95e7aeb8af99ae443494605001b98541f0638ad1a7c1b1c149672a7ed4b63f7606e081e49a0dd98705abf2bdbfc54542f3d1744790ee324454774f7befb31d5146c11a19df42de3b6fd36e1ef66112f691b12f70ee732c4905c604af5b89251cdbd556e13431dcd3229ee46d711b14aa680a60182aa"}, 0x20) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 148.100465] autofs4:pid:10076:autofs4_fill_super: called with bogus options [ 148.132781] autofs4:pid:10083:autofs4_fill_super: called with bogus options 2018/03/30 19:41:14 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:14 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) mkdir(&(0x7f0000000180)='./file2\x00', 0x2) [ 148.161816] FAULT_INJECTION: forcing a failure. [ 148.161816] name failslab, interval 1, probability 0, space 0, times 0 [ 148.173192] CPU: 0 PID: 10075 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 148.180472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.189836] Call Trace: [ 148.192441] dump_stack+0x194/0x24d [ 148.196092] ? arch_local_irq_restore+0x53/0x53 [ 148.200796] should_fail+0x8c0/0xa40 [ 148.204520] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 148.209627] ? kasan_kmalloc+0xad/0xe0 [ 148.213514] ? kmem_cache_alloc_trace+0x136/0x740 [ 148.218361] ? __memcg_init_list_lru_node+0x169/0x270 [ 148.223554] ? sget_userns+0x691/0xe40 [ 148.227446] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 148.232196] ? do_mount+0xea4/0x2bb0 [ 148.235916] ? SyS_mount+0xab/0x120 [ 148.239546] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 148.244928] ? find_held_lock+0x35/0x1d0 [ 148.249014] ? __lock_is_held+0xb6/0x140 [ 148.253099] ? check_same_owner+0x320/0x320 [ 148.257414] ? rcu_note_context_switch+0x710/0x710 [ 148.262364] should_failslab+0xec/0x120 [ 148.266335] kmem_cache_alloc_trace+0x4b/0x740 [ 148.270917] ? __kmalloc_node+0x33/0x70 [ 148.274881] ? __kmalloc_node+0x33/0x70 [ 148.278857] ? rcu_read_lock_sched_held+0x108/0x120 [ 148.283882] __memcg_init_list_lru_node+0x169/0x270 [ 148.288915] ? list_lru_add+0x7c0/0x7c0 [ 148.292890] ? __kmalloc_node+0x47/0x70 [ 148.296857] __list_lru_init+0x544/0x750 [ 148.300923] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 148.306798] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 148.311803] ? __lockdep_init_map+0xe4/0x650 [ 148.316216] ? lockdep_init_map+0x9/0x10 [ 148.320275] sget_userns+0x691/0xe40 [ 148.323975] ? kernfs_sop_show_path+0x190/0x190 [ 148.328651] ? kernfs_sop_show_options+0x180/0x180 [ 148.333579] ? destroy_unused_super.part.6+0xd0/0xd0 [ 148.338697] ? check_same_owner+0x320/0x320 [ 148.343025] ? rcu_pm_notify+0xc0/0xc0 [ 148.346920] ? rcu_read_lock_sched_held+0x108/0x120 [ 148.351934] ? kmem_cache_alloc_trace+0x459/0x740 [ 148.356772] ? lock_downgrade+0x980/0x980 [ 148.360919] kernfs_mount_ns+0x13d/0x8b0 [ 148.364968] ? kernfs_super_ns+0x70/0x70 [ 148.369051] sysfs_mount+0xc2/0x1c0 [ 148.372678] ? sysfs_kill_sb+0x40/0x40 [ 148.376551] ? alloc_pages_current+0xbe/0x1e0 [ 148.381048] ? security_sb_copy_data+0x81/0xb0 [ 148.385633] mount_fs+0x66/0x2d0 [ 148.388989] vfs_kern_mount.part.26+0xc6/0x4a0 [ 148.393561] ? may_umount+0xa0/0xa0 [ 148.397179] ? _raw_read_unlock+0x22/0x30 [ 148.401316] ? __get_fs_type+0x8a/0xc0 [ 148.405199] do_mount+0xea4/0x2bb0 [ 148.408733] ? copy_mount_string+0x40/0x40 [ 148.412967] ? rcu_pm_notify+0xc0/0xc0 [ 148.416877] ? copy_mount_options+0x5f/0x2e0 [ 148.421282] ? rcu_read_lock_sched_held+0x108/0x120 [ 148.426282] ? kmem_cache_alloc_trace+0x459/0x740 [ 148.431123] ? kasan_check_write+0x14/0x20 [ 148.435345] ? _copy_from_user+0x99/0x110 [ 148.439484] ? copy_mount_options+0x1f7/0x2e0 [ 148.443967] SyS_mount+0xab/0x120 [ 148.447413] ? copy_mnt_ns+0xb30/0xb30 [ 148.451286] do_syscall_64+0x281/0x940 [ 148.455168] ? vmalloc_sync_all+0x30/0x30 [ 148.459314] ? _raw_spin_unlock_irq+0x27/0x70 [ 148.463807] ? finish_task_switch+0x1c1/0x7e0 [ 148.468292] ? syscall_return_slowpath+0x550/0x550 [ 148.473381] ? syscall_return_slowpath+0x2ac/0x550 [ 148.478296] ? prepare_exit_to_usermode+0x350/0x350 [ 148.483309] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 148.488674] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 148.493531] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 148.498710] RIP: 0033:0x454e79 [ 148.501906] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 19:41:14 executing program 5 (fault-call:18 fault-nth:15): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 148.509631] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 148.516898] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 148.524165] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 148.531431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 148.538697] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e [ 148.852480] FAULT_INJECTION: forcing a failure. [ 148.852480] name failslab, interval 1, probability 0, space 0, times 0 [ 148.863975] CPU: 0 PID: 10098 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 148.871265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.880609] Call Trace: [ 148.883197] dump_stack+0x194/0x24d [ 148.886832] ? arch_local_irq_restore+0x53/0x53 [ 148.891538] should_fail+0x8c0/0xa40 [ 148.895272] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 148.900389] ? kasan_kmalloc+0xad/0xe0 [ 148.904277] ? kmem_cache_alloc_trace+0x136/0x740 [ 148.909127] ? __memcg_init_list_lru_node+0x169/0x270 [ 148.914324] ? sget_userns+0x691/0xe40 [ 148.918216] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 148.922966] ? do_mount+0xea4/0x2bb0 [ 148.926676] ? SyS_mount+0xab/0x120 [ 148.930290] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 148.935647] ? find_held_lock+0x35/0x1d0 [ 148.939703] ? __lock_is_held+0xb6/0x140 [ 148.943768] ? check_same_owner+0x320/0x320 [ 148.948087] ? rcu_note_context_switch+0x710/0x710 [ 148.953034] should_failslab+0xec/0x120 [ 148.957021] kmem_cache_alloc_trace+0x4b/0x740 [ 148.961606] ? __kmalloc_node+0x33/0x70 [ 148.965568] ? __kmalloc_node+0x33/0x70 [ 148.969545] ? rcu_read_lock_sched_held+0x108/0x120 [ 148.974566] __memcg_init_list_lru_node+0x169/0x270 [ 148.979593] ? list_lru_add+0x7c0/0x7c0 [ 148.983584] ? __kmalloc_node+0x47/0x70 [ 148.987557] __list_lru_init+0x544/0x750 [ 148.991610] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 148.997497] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 149.002520] ? __lockdep_init_map+0xe4/0x650 [ 149.006944] ? lockdep_init_map+0x9/0x10 [ 149.011023] sget_userns+0x691/0xe40 [ 149.014745] ? kernfs_sop_show_path+0x190/0x190 [ 149.019432] ? kernfs_sop_show_options+0x180/0x180 [ 149.024373] ? destroy_unused_super.part.6+0xd0/0xd0 [ 149.029515] ? check_same_owner+0x320/0x320 [ 149.033839] ? rcu_pm_notify+0xc0/0xc0 [ 149.037724] ? rcu_read_lock_sched_held+0x108/0x120 [ 149.042723] ? kmem_cache_alloc_trace+0x459/0x740 [ 149.047560] ? lock_downgrade+0x980/0x980 [ 149.051725] kernfs_mount_ns+0x13d/0x8b0 [ 149.055783] ? kernfs_super_ns+0x70/0x70 [ 149.059838] sysfs_mount+0xc2/0x1c0 [ 149.063447] ? sysfs_kill_sb+0x40/0x40 [ 149.067334] ? alloc_pages_current+0xbe/0x1e0 [ 149.071826] ? security_sb_copy_data+0x81/0xb0 [ 149.076392] mount_fs+0x66/0x2d0 [ 149.079745] vfs_kern_mount.part.26+0xc6/0x4a0 [ 149.084311] ? may_umount+0xa0/0xa0 [ 149.087919] ? _raw_read_unlock+0x22/0x30 [ 149.092056] ? __get_fs_type+0x8a/0xc0 [ 149.095935] do_mount+0xea4/0x2bb0 [ 149.099475] ? copy_mount_string+0x40/0x40 [ 149.103707] ? rcu_pm_notify+0xc0/0xc0 [ 149.107611] ? copy_mount_options+0x5f/0x2e0 [ 149.112005] ? rcu_read_lock_sched_held+0x108/0x120 [ 149.117020] ? kmem_cache_alloc_trace+0x459/0x740 [ 149.121859] ? kasan_check_write+0x14/0x20 [ 149.126078] ? _copy_from_user+0x99/0x110 [ 149.130220] ? copy_mount_options+0x1f7/0x2e0 [ 149.134702] SyS_mount+0xab/0x120 [ 149.138147] ? copy_mnt_ns+0xb30/0xb30 [ 149.142043] do_syscall_64+0x281/0x940 [ 149.145923] ? vmalloc_sync_all+0x30/0x30 [ 149.150071] ? finish_task_switch+0x1c1/0x7e0 [ 149.154558] ? syscall_return_slowpath+0x550/0x550 [ 149.159487] ? syscall_return_slowpath+0x2ac/0x550 [ 149.164418] ? prepare_exit_to_usermode+0x350/0x350 [ 149.169431] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 149.174798] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 149.179638] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 149.184834] RIP: 0033:0x454e79 [ 149.188021] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 149.195721] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 2018/03/30 19:41:15 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:15 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:15 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:15 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:15 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) [ 149.202982] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 149.210245] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 149.217505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 149.224756] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f [ 149.243437] autofs4:pid:10100:autofs4_fill_super: called with bogus options 2018/03/30 19:41:15 executing program 5 (fault-call:18 fault-nth:16): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:15 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x800000004, 0x80b, 0x3, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) r4 = gettid() perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0xffffffffffffff3e, 0x1, 0x4, 0x101, 0x0, 0xffffffffffff8001, 0x1, 0x1, 0x4, 0xffffffffffff7cff, 0x7, 0x8, 0x7, 0x8, 0x0, 0x2, 0x100000001, 0x3, 0xfbc, 0x9791, 0x3, 0x0, 0x3, 0x1, 0x0, 0x81, 0x1ff, 0x8, 0x7, 0x40, 0x8, 0x9, 0x5, 0x7d, 0x1, 0x4, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x1, 0x9, 0x3, 0x2, 0xffffffffffffffff, 0x3, 0x6}, r4, 0xf, r3, 0x1) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 149.296221] autofs4:pid:10106:autofs4_fill_super: called with bogus options 2018/03/30 19:41:15 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, r0, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(0xffffffffffffffff) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) [ 149.692718] FAULT_INJECTION: forcing a failure. [ 149.692718] name failslab, interval 1, probability 0, space 0, times 0 [ 149.704053] CPU: 1 PID: 10129 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 149.711321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.713068] autofs4:pid:10134:autofs4_fill_super: called with bogus options [ 149.720653] Call Trace: [ 149.720674] dump_stack+0x194/0x24d [ 149.720690] ? arch_local_irq_restore+0x53/0x53 [ 149.720702] ? __save_stack_trace+0x7e/0xd0 [ 149.720723] should_fail+0x8c0/0xa40 [ 149.720737] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 149.720751] ? kasan_kmalloc+0xad/0xe0 [ 149.720761] ? kmem_cache_alloc_trace+0x136/0x740 [ 149.720770] ? __memcg_init_list_lru_node+0x169/0x270 [ 149.720778] ? __list_lru_init+0x544/0x750 [ 149.720787] ? sget_userns+0x691/0xe40 [ 149.720797] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 149.720804] ? do_mount+0xea4/0x2bb0 [ 149.720814] ? SyS_mount+0xab/0x120 [ 149.735440] autofs4:pid:10135:autofs4_fill_super: called with bogus options [ 149.738739] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 149.738760] ? find_held_lock+0x35/0x1d0 [ 149.738776] ? __lock_is_held+0xb6/0x140 [ 149.738801] ? check_same_owner+0x320/0x320 [ 149.738816] ? rcu_note_context_switch+0x710/0x710 [ 149.738835] should_failslab+0xec/0x120 [ 149.738846] kmem_cache_alloc_trace+0x4b/0x740 [ 149.738855] ? __kmalloc_node+0x33/0x70 [ 149.738864] ? __kmalloc_node+0x33/0x70 [ 149.738873] ? rcu_read_lock_sched_held+0x108/0x120 [ 149.738887] __memcg_init_list_lru_node+0x169/0x270 [ 149.842076] ? list_lru_add+0x7c0/0x7c0 [ 149.846051] ? __kmalloc_node+0x47/0x70 [ 149.850035] __list_lru_init+0x544/0x750 [ 149.854102] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 149.859992] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 149.865011] ? __lockdep_init_map+0xe4/0x650 [ 149.869422] ? lockdep_init_map+0x9/0x10 [ 149.873484] sget_userns+0x691/0xe40 [ 149.877196] ? kernfs_sop_show_path+0x190/0x190 [ 149.881867] ? kernfs_sop_show_options+0x180/0x180 [ 149.886795] ? destroy_unused_super.part.6+0xd0/0xd0 [ 149.891906] ? check_same_owner+0x320/0x320 [ 149.896224] ? rcu_pm_notify+0xc0/0xc0 [ 149.900106] ? rcu_read_lock_sched_held+0x108/0x120 [ 149.905105] ? kmem_cache_alloc_trace+0x459/0x740 [ 149.909925] ? lock_downgrade+0x980/0x980 [ 149.914073] kernfs_mount_ns+0x13d/0x8b0 [ 149.918123] ? kernfs_super_ns+0x70/0x70 [ 149.922172] sysfs_mount+0xc2/0x1c0 [ 149.925788] ? sysfs_kill_sb+0x40/0x40 [ 149.929743] ? alloc_pages_current+0xbe/0x1e0 [ 149.934221] ? security_sb_copy_data+0x81/0xb0 [ 149.938868] mount_fs+0x66/0x2d0 [ 149.942223] vfs_kern_mount.part.26+0xc6/0x4a0 [ 149.946798] ? may_umount+0xa0/0xa0 [ 149.950412] ? _raw_read_unlock+0x22/0x30 [ 149.954541] ? __get_fs_type+0x8a/0xc0 [ 149.958418] do_mount+0xea4/0x2bb0 [ 149.961937] ? copy_mount_string+0x40/0x40 [ 149.966163] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 149.971177] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 149.975930] ? retint_kernel+0x10/0x10 [ 149.979824] ? copy_mount_options+0x149/0x2e0 [ 149.984318] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 149.989149] ? copy_mount_options+0x1f7/0x2e0 [ 149.993623] SyS_mount+0xab/0x120 [ 149.997065] ? copy_mnt_ns+0xb30/0xb30 [ 150.000947] do_syscall_64+0x281/0x940 [ 150.004837] ? vmalloc_sync_all+0x30/0x30 [ 150.008972] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 150.014495] ? syscall_return_slowpath+0x550/0x550 [ 150.019418] ? syscall_return_slowpath+0x2ac/0x550 [ 150.024338] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 150.029688] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 150.034524] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 150.039697] RIP: 0033:0x454e79 [ 150.042861] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 150.050546] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 150.057797] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 150.065056] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 150.072310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 150.079564] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 2018/03/30 19:41:16 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:16 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:16 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000180)='\x00\x00\a\x00\x00\x00\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:16 executing program 5 (fault-call:18 fault-nth:17): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:16 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:16 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:16 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r1, 0x1, r0, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(0xffffffffffffffff) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000540)={r2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r2}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r6, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r6, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r6, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) 2018/03/30 19:41:16 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:16 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001cc0)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000001c00)=[{&(0x7f00000003c0)=""/29, 0x1d}, {&(0x7f00000004c0)=""/36, 0x24}, {&(0x7f00000009c0)=""/215, 0xd7}, {&(0x7f0000000ac0)=""/123, 0x7b}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000000940)=""/20, 0x14}, {&(0x7f0000001b40)=""/118, 0x76}, {&(0x7f0000001bc0)=""/29, 0x1d}], 0x8, &(0x7f0000001c80)=""/57, 0x39, 0x1}, 0x10000) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000001d00)='./file1\x00', &(0x7f0000001d80)='jfs\x00', 0x80, &(0x7f0000001dc0)="b5d489b6dd5b86822f26a1820141bbdd879c93b7a1840b6931eaa72af088a499792968950ad7e6546f54eb88bcc2fd085a6b161b79feaeb2d59d1b16b0233fd878e4b8ac572040387bf926f7d91ec5d9778233a509b03e94a1a648481b722f1afeafc8a3e7fe7553f5a64502a8a476bdf1c4b6616b67321d75e15569accf9b624c0531183c71737e008dd056297da6bba1ed4bce0c720272cff27f82da37c0071472221ad481f72c662e4f8f5c3a5ac05c345783ed3342910d0a5e0e67cb52448d70c4dc7d83444c01e03e7b85c58db9fd897ffe4702d55538a4c05cd11cc1d3") r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) recvmsg(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 150.830635] FAULT_INJECTION: forcing a failure. [ 150.830635] name failslab, interval 1, probability 0, space 0, times 0 [ 150.842171] CPU: 0 PID: 10163 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 150.849466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.858835] Call Trace: [ 150.861442] dump_stack+0x194/0x24d [ 150.865095] ? arch_local_irq_restore+0x53/0x53 [ 150.869809] should_fail+0x8c0/0xa40 [ 150.873549] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 150.878665] ? kasan_kmalloc+0xad/0xe0 [ 150.882566] ? kmem_cache_alloc_trace+0x136/0x740 [ 150.887435] ? __memcg_init_list_lru_node+0x169/0x270 [ 150.892636] ? sget_userns+0x691/0xe40 [ 150.896535] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 150.901289] ? do_mount+0xea4/0x2bb0 [ 150.905000] ? SyS_mount+0xab/0x120 [ 150.908627] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 150.913988] ? find_held_lock+0x35/0x1d0 [ 150.918064] ? __lock_is_held+0xb6/0x140 [ 150.922144] ? check_same_owner+0x320/0x320 [ 150.926469] ? rcu_note_context_switch+0x710/0x710 [ 150.931416] should_failslab+0xec/0x120 [ 150.935401] kmem_cache_alloc_trace+0x4b/0x740 [ 150.939984] ? __kmalloc_node+0x33/0x70 [ 150.943946] ? __kmalloc_node+0x33/0x70 [ 150.947920] ? rcu_read_lock_sched_held+0x108/0x120 [ 150.952944] __memcg_init_list_lru_node+0x169/0x270 [ 150.957969] ? list_lru_add+0x7c0/0x7c0 [ 150.961959] ? __kmalloc_node+0x47/0x70 [ 150.965939] __list_lru_init+0x544/0x750 [ 150.970011] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 150.975905] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 150.980910] ? __lockdep_init_map+0xe4/0x650 [ 150.985309] ? lockdep_init_map+0x9/0x10 [ 150.989368] sget_userns+0x691/0xe40 [ 150.993081] ? kernfs_sop_show_path+0x190/0x190 [ 150.997760] ? kernfs_sop_show_options+0x180/0x180 [ 151.002686] ? destroy_unused_super.part.6+0xd0/0xd0 [ 151.007787] ? check_same_owner+0x320/0x320 [ 151.012184] ? rcu_pm_notify+0xc0/0xc0 [ 151.016099] ? rcu_read_lock_sched_held+0x108/0x120 [ 151.021126] ? kmem_cache_alloc_trace+0x459/0x740 [ 151.025963] ? lock_downgrade+0x980/0x980 [ 151.030111] kernfs_mount_ns+0x13d/0x8b0 [ 151.034175] ? kernfs_super_ns+0x70/0x70 [ 151.038244] sysfs_mount+0xc2/0x1c0 [ 151.041859] ? sysfs_kill_sb+0x40/0x40 [ 151.045738] ? alloc_pages_current+0xbe/0x1e0 [ 151.050222] ? security_sb_copy_data+0x81/0xb0 [ 151.054793] mount_fs+0x66/0x2d0 [ 151.058151] vfs_kern_mount.part.26+0xc6/0x4a0 [ 151.062729] ? may_umount+0xa0/0xa0 [ 151.066362] ? _raw_read_unlock+0x22/0x30 [ 151.070519] ? __get_fs_type+0x8a/0xc0 [ 151.074410] do_mount+0xea4/0x2bb0 [ 151.077947] ? copy_mount_string+0x40/0x40 [ 151.082167] ? rcu_pm_notify+0xc0/0xc0 [ 151.086070] ? copy_mount_options+0x5f/0x2e0 [ 151.090476] ? rcu_read_lock_sched_held+0x108/0x120 [ 151.095490] ? kmem_cache_alloc_trace+0x459/0x740 [ 151.100353] ? copy_mount_options+0x1f7/0x2e0 [ 151.104864] SyS_mount+0xab/0x120 [ 151.108311] ? copy_mnt_ns+0xb30/0xb30 [ 151.112187] do_syscall_64+0x281/0x940 [ 151.116067] ? vmalloc_sync_all+0x30/0x30 [ 151.120218] ? _raw_spin_unlock_irq+0x27/0x70 [ 151.124711] ? finish_task_switch+0x1c1/0x7e0 [ 151.129197] ? syscall_return_slowpath+0x550/0x550 [ 151.134112] ? syscall_return_slowpath+0x2ac/0x550 [ 151.139042] ? prepare_exit_to_usermode+0x350/0x350 [ 151.144059] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 151.149423] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 151.154285] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 151.159477] RIP: 0033:0x454e79 [ 151.162649] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 151.170346] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 2018/03/30 19:41:17 executing program 5 (fault-call:18 fault-nth:18): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 151.177611] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 151.184875] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 151.192140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 151.199419] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 2018/03/30 19:41:17 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 151.453376] autofs4:pid:10181:autofs4_fill_super: called with bogus options [ 151.583246] FAULT_INJECTION: forcing a failure. [ 151.583246] name failslab, interval 1, probability 0, space 0, times 0 [ 151.594745] CPU: 0 PID: 10186 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 151.602039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.611401] Call Trace: [ 151.614003] dump_stack+0x194/0x24d [ 151.617655] ? arch_local_irq_restore+0x53/0x53 [ 151.622339] should_fail+0x8c0/0xa40 [ 151.626055] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 151.631147] ? kasan_kmalloc+0xad/0xe0 [ 151.635029] ? kmem_cache_alloc_trace+0x136/0x740 [ 151.639874] ? __memcg_init_list_lru_node+0x169/0x270 [ 151.645065] ? sget_userns+0x691/0xe40 [ 151.648954] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 151.653696] ? do_mount+0xea4/0x2bb0 [ 151.657410] ? SyS_mount+0xab/0x120 [ 151.661057] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 151.666447] ? find_held_lock+0x35/0x1d0 [ 151.670510] ? __lock_is_held+0xb6/0x140 [ 151.674605] ? check_same_owner+0x320/0x320 [ 151.678953] ? rcu_note_context_switch+0x710/0x710 [ 151.683895] should_failslab+0xec/0x120 [ 151.687875] kmem_cache_alloc_trace+0x4b/0x740 [ 151.692473] ? __kmalloc_node+0x33/0x70 [ 151.696547] ? __kmalloc_node+0x33/0x70 [ 151.700526] ? rcu_read_lock_sched_held+0x108/0x120 [ 151.705552] __memcg_init_list_lru_node+0x169/0x270 [ 151.710593] ? list_lru_add+0x7c0/0x7c0 [ 151.714575] ? __kmalloc_node+0x47/0x70 [ 151.718572] __list_lru_init+0x544/0x750 [ 151.722649] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 151.728550] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 151.733580] ? __lockdep_init_map+0xe4/0x650 [ 151.738003] ? lockdep_init_map+0x9/0x10 [ 151.742075] sget_userns+0x691/0xe40 [ 151.745792] ? kernfs_sop_show_path+0x190/0x190 [ 151.750481] ? kernfs_sop_show_options+0x180/0x180 [ 151.755423] ? destroy_unused_super.part.6+0xd0/0xd0 [ 151.760551] ? check_same_owner+0x320/0x320 [ 151.764880] ? rcu_pm_notify+0xc0/0xc0 [ 151.768792] ? rcu_read_lock_sched_held+0x108/0x120 [ 151.773815] ? kmem_cache_alloc_trace+0x459/0x740 [ 151.778650] ? lock_downgrade+0x980/0x980 [ 151.782817] kernfs_mount_ns+0x13d/0x8b0 [ 151.786880] ? kernfs_super_ns+0x70/0x70 [ 151.790939] sysfs_mount+0xc2/0x1c0 [ 151.794548] ? sysfs_kill_sb+0x40/0x40 [ 151.798422] ? alloc_pages_current+0xbe/0x1e0 [ 151.802906] ? security_sb_copy_data+0x81/0xb0 [ 151.807475] mount_fs+0x66/0x2d0 [ 151.810830] vfs_kern_mount.part.26+0xc6/0x4a0 [ 151.815406] ? may_umount+0xa0/0xa0 [ 151.819024] ? _raw_read_unlock+0x22/0x30 [ 151.823164] ? __get_fs_type+0x8a/0xc0 [ 151.827051] do_mount+0xea4/0x2bb0 [ 151.830582] ? copy_mount_string+0x40/0x40 [ 151.834803] ? rcu_pm_notify+0xc0/0xc0 [ 151.838703] ? copy_mount_options+0x5f/0x2e0 [ 151.843109] ? rcu_read_lock_sched_held+0x108/0x120 [ 151.848131] ? kmem_cache_alloc_trace+0x459/0x740 [ 151.852970] ? kasan_check_write+0x14/0x20 [ 151.857188] ? _copy_from_user+0x99/0x110 [ 151.861343] ? copy_mount_options+0x1f7/0x2e0 [ 151.865838] SyS_mount+0xab/0x120 [ 151.869274] ? copy_mnt_ns+0xb30/0xb30 [ 151.873161] do_syscall_64+0x281/0x940 [ 151.877052] ? vmalloc_sync_all+0x30/0x30 [ 151.881190] ? _raw_spin_unlock_irq+0x27/0x70 [ 151.885672] ? finish_task_switch+0x1c1/0x7e0 [ 151.890153] ? syscall_return_slowpath+0x550/0x550 [ 151.895065] ? syscall_return_slowpath+0x2ac/0x550 [ 151.899983] ? prepare_exit_to_usermode+0x350/0x350 [ 151.904993] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 151.910357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 151.915215] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 151.920405] RIP: 0033:0x454e79 [ 151.923589] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 151.931293] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 151.938560] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 151.945814] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 151.953073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 151.960330] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 2018/03/30 19:41:18 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r2, &(0x7f0000000940)={&(0x7f0000000340)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000001d40)=[{&(0x7f0000000180)=""/43, 0x2b}, {&(0x7f00000009c0)=""/172, 0xac}, {&(0x7f0000000a80)=""/152, 0x98}, {&(0x7f0000000b40)=""/235, 0xeb}, {&(0x7f0000000c40)=""/222, 0xde}, {&(0x7f0000000d40)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/34, 0x22}], 0x7, &(0x7f00000004c0)=""/20, 0x14, 0x2}, 0x20) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:18 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:18 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:18 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) [ 152.364624] autofs4:pid:10203:autofs4_fill_super: called with bogus options sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:18 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:18 executing program 5 (fault-call:18 fault-nth:19): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:18 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x0, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:18 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 152.481950] FAULT_INJECTION: forcing a failure. [ 152.481950] name failslab, interval 1, probability 0, space 0, times 0 [ 152.493274] CPU: 1 PID: 10212 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 152.500544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.509907] Call Trace: [ 152.512500] dump_stack+0x194/0x24d [ 152.516131] ? arch_local_irq_restore+0x53/0x53 [ 152.520796] ? __save_stack_trace+0x7e/0xd0 [ 152.525125] should_fail+0x8c0/0xa40 2018/03/30 19:41:18 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x0, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 152.528844] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 152.533949] ? kasan_kmalloc+0xad/0xe0 [ 152.537832] ? kmem_cache_alloc_trace+0x136/0x740 [ 152.542678] ? __memcg_init_list_lru_node+0x169/0x270 [ 152.547872] ? __list_lru_init+0x544/0x750 [ 152.552106] ? sget_userns+0x691/0xe40 [ 152.555998] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 152.560751] ? do_mount+0xea4/0x2bb0 [ 152.564460] ? SyS_mount+0xab/0x120 [ 152.568082] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 152.573435] ? find_held_lock+0x35/0x1d0 [ 152.577481] ? __lock_is_held+0xb6/0x140 [ 152.581537] ? check_same_owner+0x320/0x320 [ 152.585839] ? rcu_note_context_switch+0x710/0x710 [ 152.590754] should_failslab+0xec/0x120 [ 152.594707] kmem_cache_alloc_trace+0x4b/0x740 [ 152.599267] ? __kmalloc_node+0x33/0x70 [ 152.603217] ? __kmalloc_node+0x33/0x70 [ 152.607170] ? rcu_read_lock_sched_held+0x108/0x120 [ 152.612164] __memcg_init_list_lru_node+0x169/0x270 [ 152.617159] ? list_lru_add+0x7c0/0x7c0 [ 152.621112] ? __kmalloc_node+0x47/0x70 [ 152.625067] __list_lru_init+0x544/0x750 [ 152.629111] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 152.634972] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 152.639967] ? __lockdep_init_map+0xe4/0x650 [ 152.644354] ? lockdep_init_map+0x9/0x10 [ 152.648392] sget_userns+0x691/0xe40 [ 152.652086] ? kernfs_sop_show_path+0x190/0x190 [ 152.656734] ? kernfs_sop_show_options+0x180/0x180 [ 152.661639] ? destroy_unused_super.part.6+0xd0/0xd0 [ 152.666724] ? check_same_owner+0x320/0x320 [ 152.671028] ? rcu_pm_notify+0xc0/0xc0 [ 152.674902] ? rcu_read_lock_sched_held+0x108/0x120 [ 152.679894] ? kmem_cache_alloc_trace+0x459/0x740 [ 152.684713] ? lock_downgrade+0x980/0x980 [ 152.688846] kernfs_mount_ns+0x13d/0x8b0 [ 152.692888] ? kernfs_super_ns+0x70/0x70 [ 152.696931] sysfs_mount+0xc2/0x1c0 [ 152.700533] ? sysfs_kill_sb+0x40/0x40 [ 152.704398] ? alloc_pages_current+0xbe/0x1e0 [ 152.708871] ? security_sb_copy_data+0x81/0xb0 [ 152.713432] mount_fs+0x66/0x2d0 [ 152.716775] vfs_kern_mount.part.26+0xc6/0x4a0 [ 152.721339] ? may_umount+0xa0/0xa0 [ 152.724943] ? _raw_read_unlock+0x22/0x30 [ 152.729069] ? __get_fs_type+0x8a/0xc0 [ 152.732936] do_mount+0xea4/0x2bb0 [ 152.736457] ? copy_mount_string+0x40/0x40 [ 152.740669] ? rcu_pm_notify+0xc0/0xc0 [ 152.744536] ? copy_mount_options+0x5f/0x2e0 [ 152.748921] ? rcu_read_lock_sched_held+0x108/0x120 [ 152.753913] ? kmem_cache_alloc_trace+0x459/0x740 [ 152.758731] ? kasan_check_write+0x14/0x20 [ 152.762944] ? _copy_from_user+0x99/0x110 [ 152.767073] ? copy_mount_options+0x1f7/0x2e0 [ 152.771546] SyS_mount+0xab/0x120 [ 152.774973] ? copy_mnt_ns+0xb30/0xb30 [ 152.778839] do_syscall_64+0x281/0x940 [ 152.782708] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 152.788221] ? syscall_return_slowpath+0x550/0x550 [ 152.793128] ? syscall_return_slowpath+0x2ac/0x550 [ 152.798043] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 152.803388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 152.808210] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 152.813375] RIP: 0033:0x454e79 [ 152.816540] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 152.824225] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 2018/03/30 19:41:18 executing program 5 (fault-call:18 fault-nth:20): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 152.831469] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 152.838714] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 152.845958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 152.853201] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 2018/03/30 19:41:18 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f00000009c0)="f1471edbc3e15d895cda6dd0cc96da790c9e6c79808049a05cbefed14cebea68bde48d6500cb55fced5b93f41b2d5a5398c31b96355e44522aa3d02bb2f9e76d8ebbbc761d86ff1876ca71b8e1978ea3d2c2f57da3613f82c67a5f236dd1de2f99ceba3f7f6b7bfc0ea555fe049f855ef2f430ae1d5fe83d8aba0bca735b6c0272bccf5f74120cd619a01568970a3fa4740b6207ffc0e9a8a221cbb06e9e561ed87138c9274adb315575e81a5d6134266dd73e8ba8604bc0f06b520df42af9fdd3d71cca9ed990910aa9c719e2660db6a02b09b81c2d6201be7cc6e5f38195a75668b7f2eebf0f1a0096acf24930a75788814b0acae84f", 0xf7}, {&(0x7f0000000340)="e84c8c48ee40911043dc4b288f1eb212bae3d1d78bb5856db365afb5fd682b6a025544820d877e80acb9aac1d812390e03c7e427078cc7b4cdbba6c98e65db63e03c48c8a4e437ae1f454bbcd7e04593e68057c846b088f29a25ee61c4b1efa11a63ebe1492c", 0x66}, {&(0x7f0000000ac0)="b81664d18fe9fc45c382ba8e84ed582d478190dd9b822b1f4e7ecde2bd4bdc7f322daca74357c15c4f94824ca60175b2b1507105bc5b274949bb13185fae26a2e95e58ad45c3914c18debc742400c2850a8fadab7db38800f1d835208f797097e0563e1878b6743e9727f3fa40f90570d649ebbc1e5c6ac8cab1", 0x7a}, {&(0x7f0000000b40)="0581e23897576fe76bbcbf3b193c22194b0482da98fac4fd4dce77e553da3a630d0c25dacdcd4deb0964d5ecf3a24915c8ec8893e59915f0e9ebefcfd48d2718f46779b854e04dab34f47662d8f4c100393e2b5b922ab02a2137afff112f1d91a59f1fb2f7acb6e24eb0052178b29ca4709f2a240d2a65450d12e1aeb96404f8323da1d01075e9d0bf4e0dc9", 0x8c}, {&(0x7f0000000c00)="2f81bcc33937e73196e51a2f46ba4395cfa579ecab3cbbad825b32976f87b24299fb3c10e3a09ac8630aec9581642c7b467b34148f316f276ef705d4d1f2ba019daba60380e9986602b9ecc8890cac3c4c8e52539991404a0e192679c22e55efddd4a5ee6c65c78f739d01b6412f49619b4f66426cc23f35bdfec8f4750bde3349e6cbaaf5ee9b9e5730d1145ee007c9aac17069ddf31262220fd87e24ecce6d389c973379fd185875ad37c954413e0197740ec6c05fafaf38ef807af69997ed708e25ab08a4c20dfd7a0e35b2f229bde74295e09594128519703a3c3845ac04784d39fc28a0fe01769f", 0xea}, {&(0x7f0000000d00)="16ed6d04fb8ae401b06d015953f463c0259b928a3c8fadb8ab5535c02ae638eab9101f536c3d093b44e5f192f36ef8543e498227bcd73240a178f8617610c00dfb4fc3fb0b3de074bf02e6e5853aeb322968e584438c2cbc062a565d8832a8f576eb55a6e2e7d73f7e38fffd3791a2e90d4d8f67", 0x74}, {&(0x7f0000000d80)="7baa80e112d027aa9b519910ac23d19a1f826d9e937437b6f4c31290c4ccad4150dcf51d12b03b7a59f03dbfc7f24ca994f24dde4cf34b9df4636177bfc43dcfc133efe883c00e9fc3617e15c5038dc81508ca5a535771ee64ac08ec6831fcd76e143696a99b6b564beb42c14b7379760f08e3a0fc32f46936cd71cc2f4bd7324717bb2e8ed783673fb1228b20e66785595fd7f66d4bed7f0307600a90b71ac3776d95950716493ce05290f928baa330f72771ff35826c5fdaaf4d9104e153a67b3596d710a2bc15a6a7534f799fb96176", 0xd1}], 0x7, 0x0, 0x0, 0x20000000}, 0x40) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 153.011466] autofs4:pid:10228:autofs4_fill_super: called with bogus options [ 153.022303] autofs4:pid:10229:autofs4_fill_super: called with bogus options [ 153.125795] FAULT_INJECTION: forcing a failure. [ 153.125795] name failslab, interval 1, probability 0, space 0, times 0 [ 153.137175] CPU: 1 PID: 10236 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 153.144446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.153790] Call Trace: [ 153.156366] dump_stack+0x194/0x24d [ 153.159978] ? arch_local_irq_restore+0x53/0x53 [ 153.164627] ? __save_stack_trace+0x7e/0xd0 [ 153.168949] should_fail+0x8c0/0xa40 [ 153.172655] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 153.177752] ? kasan_kmalloc+0xad/0xe0 [ 153.181629] ? kmem_cache_alloc_trace+0x136/0x740 [ 153.186460] ? __memcg_init_list_lru_node+0x169/0x270 [ 153.191638] ? __list_lru_init+0x544/0x750 [ 153.195864] ? sget_userns+0x691/0xe40 [ 153.199733] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 153.204466] ? do_mount+0xea4/0x2bb0 [ 153.208168] ? SyS_mount+0xab/0x120 [ 153.211797] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 153.212804] autofs4:pid:10239:autofs4_fill_super: called with bogus options [ 153.217159] ? find_held_lock+0x35/0x1d0 [ 153.217177] ? __lock_is_held+0xb6/0x140 [ 153.217202] ? check_same_owner+0x320/0x320 [ 153.217219] ? rcu_note_context_switch+0x710/0x710 [ 153.217238] should_failslab+0xec/0x120 [ 153.217251] kmem_cache_alloc_trace+0x4b/0x740 [ 153.217261] ? __kmalloc_node+0x33/0x70 [ 153.217270] ? __kmalloc_node+0x33/0x70 [ 153.217278] ? rcu_read_lock_sched_held+0x108/0x120 [ 153.217291] __memcg_init_list_lru_node+0x169/0x270 [ 153.228462] autofs4:pid:10240:autofs4_fill_super: called with bogus options [ 153.232468] ? list_lru_add+0x7c0/0x7c0 [ 153.232481] ? __kmalloc_node+0x47/0x70 [ 153.232498] __list_lru_init+0x544/0x750 [ 153.232513] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 153.232526] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 153.232538] ? __lockdep_init_map+0xe4/0x650 [ 153.232551] ? lockdep_init_map+0x9/0x10 [ 153.232565] sget_userns+0x691/0xe40 [ 153.232576] ? kernfs_sop_show_path+0x190/0x190 [ 153.232589] ? kernfs_sop_show_options+0x180/0x180 [ 153.232599] ? destroy_unused_super.part.6+0xd0/0xd0 [ 153.324784] ? check_same_owner+0x320/0x320 [ 153.329085] ? rcu_pm_notify+0xc0/0xc0 [ 153.332966] ? rcu_read_lock_sched_held+0x108/0x120 [ 153.337967] ? kmem_cache_alloc_trace+0x459/0x740 [ 153.342786] ? lock_downgrade+0x980/0x980 [ 153.346936] kernfs_mount_ns+0x13d/0x8b0 [ 153.350982] ? kernfs_super_ns+0x70/0x70 [ 153.355037] sysfs_mount+0xc2/0x1c0 [ 153.358658] ? sysfs_kill_sb+0x40/0x40 [ 153.362525] ? alloc_pages_current+0xbe/0x1e0 [ 153.367027] ? security_sb_copy_data+0x81/0xb0 [ 153.371606] mount_fs+0x66/0x2d0 [ 153.374974] vfs_kern_mount.part.26+0xc6/0x4a0 [ 153.379549] ? may_umount+0xa0/0xa0 [ 153.383173] ? _raw_read_unlock+0x22/0x30 [ 153.387318] ? __get_fs_type+0x8a/0xc0 [ 153.391203] do_mount+0xea4/0x2bb0 [ 153.394746] ? copy_mount_string+0x40/0x40 [ 153.398978] ? rcu_pm_notify+0xc0/0xc0 [ 153.402869] ? copy_mount_options+0x5f/0x2e0 [ 153.407275] ? rcu_read_lock_sched_held+0x108/0x120 [ 153.412281] ? kmem_cache_alloc_trace+0x459/0x740 [ 153.417107] ? kasan_check_write+0x14/0x20 [ 153.421336] ? copy_mount_options+0x1f7/0x2e0 2018/03/30 19:41:19 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:19 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:19 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x0, 0x7f, &(0x7f0000000340)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:19 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x0, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:19 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) [ 153.425834] SyS_mount+0xab/0x120 [ 153.429277] ? copy_mnt_ns+0xb30/0xb30 [ 153.433159] do_syscall_64+0x281/0x940 [ 153.437041] ? vmalloc_sync_all+0x30/0x30 [ 153.441186] ? _raw_spin_unlock_irq+0x27/0x70 [ 153.445680] ? finish_task_switch+0x1c1/0x7e0 [ 153.450176] ? syscall_return_slowpath+0x550/0x550 [ 153.455101] ? syscall_return_slowpath+0x2ac/0x550 [ 153.460032] ? prepare_exit_to_usermode+0x350/0x350 [ 153.465046] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 153.470414] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/30 19:41:19 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x0, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:19 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) [ 153.475255] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 153.480434] RIP: 0033:0x454e79 [ 153.483616] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 153.491316] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 153.498573] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 153.505857] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 153.513122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 153.520384] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 2018/03/30 19:41:19 executing program 5 (fault-call:18 fault-nth:21): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 153.555842] autofs4:pid:10250:autofs4_fill_super: called with bogus options 2018/03/30 19:41:19 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000004900)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000340)=@generic={0x9, "be26e73c8e942b59410bd84b52461e0eaa03230767f67f234c76283f0c0a48e156e00d644480a8404e2be3f8c0649df3ac14dce6454fac38667d6f0eb30b5290225ac4303291da3519858fd404a2d733b6826e92eac7f472a4a5db514d0380621adad676cc669a344bc1f621f49459452004f67e3e5463c57d95ae7895da"}, 0x80, &(0x7f0000002d80)=[{&(0x7f00000009c0)="250bcd90b1e65ce5639ef0f95982ffb8d35cef4fe3f9244958489f0c272c288a37cc45453f05c9b6d6ec27e79948c9db00cb330c33fd7b958da2764fec23e88611c9a95d2912f651dfedff53f1ecf25e9ff2f19a9a4e7739d7b39c77fde9847e8d77992580408e537368746e09792b2e7422c2d8ca2666323ac7ded842c232daeff768f75d05dca6ff3326789e353f855f9fe09e05a4ec663c5b9c46", 0x9c}, {&(0x7f0000000a80)="fe8269060aeded316a5676de0dc44f97749e5d0a63c2cdb35136c516389fa34b75322a4ddce37de04f2174cbfe757eddcd3ba33cd600593c7686b2953cf7d63df7b623200107217de935b7369f1efb45d13e0ff7e92707e0f4258980be13413ded376ee343728af25728df0c6d3cd3a9cd7a8c0d8e8e9f50a9bd647863f38721980883", 0x83}, {&(0x7f0000000b40)="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", 0x1000}, {&(0x7f0000001b40)="f86d678d9d77524d44e03ca55603211666553d07fe0e7593f3b3ced4017eddaef2c08c96fba880fdb87e1757e23f8700b5aa5dff3d1e438531d3d31c1d03db6c4c365b925e5174975aa6cf38ed05d848aee7867eab13db9687342f0a2e99ced5b098d2dd3c5287a193a2873af47a24cb6285561180ab469295f8b5d9a5044fe812559bbf45e46e4068fd40b5785494e24b47d74a2639208c2a59ce53dea648f914fac4c4b7fe2c393891b7e96c883d96ca484fc46a268b7d8c1c41365cad38", 0xbf}, {&(0x7f0000001c00)="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", 0x1000}, {&(0x7f0000002c00)="e1cf75b1b2d1d5af381d5e957c95eff98b7fa98838e6b767c5dc00a16e386d8723864744d0a05dbe55397dee358baaa5460bdbb5071146e25f352018f914d6709fec57caf0196563c43877f02f07a89ec7e55ae5d9e1abb01cc8eba0636b970123a656a18afe4ad0e4548dafff8a0125a70f9512243be963399236abd3d4149d1130359566b89d0c171bbba5cdadd60473fa1b909822adc0c5d83e74cd2b74d4d21741fdae9dfa3b5e60cedfdbe390eb9318c61696c1e281df26ac7caeeb62", 0xbf}, {&(0x7f0000002cc0)="8f5ac555a73656ab307ba10ef1184257852a591091bcdd79e1dfeb0664d30dbe4e71ffdef7001b1ff85ae61593a6673d87fca3a1c020b90d320b4b2718ce35f582b7e2d1fc45dea30d818510558e3c39a89302135102e7f12fe4ec98b7a18f94fa5163a1a398372324c4e78ff862c24d624860776ebbbb63cc24a22360a1255784d518c6d6ca60adb185797a9fdc9b5298826071c551e9de8fc142010979960ad12c7e60fddebc", 0xa7}], 0x7, &(0x7f0000002e00)=[{0x1010, 0x112, 0x1000, "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"}, {0xc0, 0xff, 0x7, "2a3f043337590661f5d167d2a29b20f4759557ce0d0d017f7ca338bfd13849e40b270ef8abc6f4f480288630836a9d2a4270ae7acf500bdd9ddcc16a6f4cef9d23ed248a1528d38feed1569aab22d2e77c618756edc93a7de0394746fa28ee541612117631ab19085fda37262faf9396dc02f8f7f68504dc62873b3723850efbaa34cd3dab0081ecb79e69d4f684a4bb67043a9ce2fb710a13f4248d3c6234aad56ae6c7ff84270fd366b8"}, {0x78, 0x102, 0x9, "faa66302a5f20665bd19de26ca6dc0883100fb4cb56ff54d4ca00b76466b42025bd69410a10e7750fa554bce9b727883fcbedf77538eac18aad333dab99bc37421d9c09bb1425ea2fec16bcb1d7bbeca257e932294bd326c016c5680bbba33ca459f956e"}, {0x100, 0x11, 0x8d, "0347f65b7d164fad555a9395180d467934692945e99db56fa043a919bed5de1ae720d6a67322e945cf9a479a674b7d3b01b68d09c71cd0d353d7db051e06c5db0029223ee0c1ec04def04f64568dd36cbc554e337f02310e31b0fe860a77fe3679ba598dbf31b891ccc25c2e55991e1ac8f7390caf794cc392b88674ca3067bfcedb600ed152adb68e44384c20c4ff01eb29e8317ef9a143ebc28413d2fd30284606733386ddb2484e9e8bc30179aae117c8550642bb5dae223e97b9eee2fb960ebfc46b2b980d1458e2318def234b6534ffdae8d22c84776bcdf83560bbe1a5985ba89c1c8cf917e9be77"}, {0x50, 0x117, 0x5bcc417e, "ee3b0604c230955d40de78f72b2ac61f54c844e33b9df6388c98cf5ae741174ec71d82af1af7f16d8167f30735862ec62fe14064cc17ec828360159dcb956f"}], 0x1298, 0x20000040}, 0x20000004) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) recvmsg$kcm(r2, &(0x7f0000000940)={&(0x7f00000040c0)=@hci, 0x80, &(0x7f0000004780)=[{&(0x7f0000004140)=""/209, 0xd1}, {&(0x7f00000048c0)=""/6, 0x6}, {&(0x7f0000004240)=""/72, 0x48}, {&(0x7f00000004c0)=""/28, 0x1c}, {&(0x7f00000042c0)=""/199, 0xc7}, {&(0x7f00000043c0)=""/228, 0xe4}, {&(0x7f00000044c0)=""/127, 0x7f}, {&(0x7f0000004540)=""/234, 0xea}, {&(0x7f0000004640)=""/92, 0x5c}, {&(0x7f00000046c0)=""/162, 0xa2}], 0xa, &(0x7f0000004840)=""/85, 0x55, 0xe66}, 0x21) [ 153.599909] autofs4:pid:10259:autofs4_fill_super: called with bogus options 2018/03/30 19:41:19 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x0, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 153.830641] FAULT_INJECTION: forcing a failure. [ 153.830641] name failslab, interval 1, probability 0, space 0, times 0 [ 153.841970] CPU: 1 PID: 10280 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 153.849236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.858583] Call Trace: [ 153.861165] dump_stack+0x194/0x24d [ 153.864783] ? arch_local_irq_restore+0x53/0x53 [ 153.869457] should_fail+0x8c0/0xa40 [ 153.873152] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 153.878251] ? trace_event_raw_event_lock+0x340/0x340 [ 153.883446] ? trace_hardirqs_off+0x10/0x10 [ 153.887771] ? lock_downgrade+0x980/0x980 [ 153.891921] ? trace_hardirqs_off+0x10/0x10 [ 153.896240] ? find_held_lock+0x35/0x1d0 [ 153.900297] ? __lock_is_held+0xb6/0x140 [ 153.904366] ? check_same_owner+0x320/0x320 [ 153.908684] ? rcu_note_context_switch+0x710/0x710 [ 153.913610] ? rcu_note_context_switch+0x710/0x710 [ 153.918542] should_failslab+0xec/0x120 [ 153.920533] autofs4:pid:10284:autofs4_fill_super: called with bogus options [ 153.922509] __kmalloc+0x63/0x760 [ 153.922523] ? __kmalloc_node+0x47/0x70 [ 153.922536] ? __list_lru_init+0xcf/0x750 [ 153.922552] __list_lru_init+0xcf/0x750 [ 153.922568] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 153.922581] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 153.922597] ? lockdep_init_map+0x9/0x10 [ 153.922610] sget_userns+0x6b1/0xe40 [ 153.922619] ? kernfs_sop_show_path+0x190/0x190 [ 153.922632] ? kernfs_sop_show_options+0x180/0x180 [ 153.936317] autofs4:pid:10285:autofs4_fill_super: called with bogus options [ 153.937110] ? destroy_unused_super.part.6+0xd0/0xd0 [ 153.937133] ? check_same_owner+0x320/0x320 [ 153.937145] ? rcu_pm_notify+0xc0/0xc0 [ 153.937166] ? rcu_read_lock_sched_held+0x108/0x120 [ 153.937178] ? kmem_cache_alloc_trace+0x459/0x740 [ 153.937188] ? lock_downgrade+0x980/0x980 [ 153.937209] kernfs_mount_ns+0x13d/0x8b0 [ 153.937223] ? kernfs_super_ns+0x70/0x70 [ 153.937241] sysfs_mount+0xc2/0x1c0 [ 153.937250] ? sysfs_kill_sb+0x40/0x40 [ 153.937264] ? alloc_pages_current+0xbe/0x1e0 [ 153.937278] ? security_sb_copy_data+0x81/0xb0 [ 153.937289] mount_fs+0x66/0x2d0 [ 153.937310] vfs_kern_mount.part.26+0xc6/0x4a0 [ 154.040309] ? may_umount+0xa0/0xa0 [ 154.043924] ? _raw_read_unlock+0x22/0x30 [ 154.048063] ? __get_fs_type+0x8a/0xc0 [ 154.051960] do_mount+0xea4/0x2bb0 [ 154.055502] ? copy_mount_string+0x40/0x40 [ 154.059727] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 154.064735] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 154.069485] ? retint_kernel+0x10/0x10 [ 154.073372] ? copy_mount_options+0x18b/0x2e0 [ 154.077854] ? copy_mount_options+0x196/0x2e0 [ 154.082338] ? copy_mount_options+0x1f7/0x2e0 [ 154.086829] SyS_mount+0xab/0x120 [ 154.090269] ? copy_mnt_ns+0xb30/0xb30 [ 154.094149] do_syscall_64+0x281/0x940 [ 154.098033] ? vmalloc_sync_all+0x30/0x30 [ 154.102174] ? _raw_spin_unlock_irq+0x27/0x70 [ 154.106651] ? finish_task_switch+0x1c1/0x7e0 [ 154.111139] ? syscall_return_slowpath+0x550/0x550 [ 154.116053] ? syscall_return_slowpath+0x2ac/0x550 [ 154.120961] ? prepare_exit_to_usermode+0x350/0x350 [ 154.125956] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 154.131309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 154.136151] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 154.141325] RIP: 0033:0x454e79 [ 154.144492] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 154.152194] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 154.159455] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 154.166714] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 154.173975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 2018/03/30 19:41:20 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000001200)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001280), 0x0, 0x0, 0x0, 0x6}, 0x0) sendmsg$kcm(r0, &(0x7f0000002700)={&(0x7f0000001300)=@nfc_llcp={0x27, 0x1, 0x1, 0x2, 0xffffffff, 0x401, "bf59aadb763499ae17e577d92bd15d72cd9d4eb47d90eb323431c84d70d71a60bb0e4419e6cf3bdfa1deaff2c01ec66f4e8724b17d1dcc52f28806cfdbfc81", 0x17}, 0x80, &(0x7f0000002500)=[{&(0x7f0000001380)="008e782610849fea4182f550782d4def883bc40c8aeb6dc51170a4561c73c60e25f16416cabe18257f392fafcab1ef8d624697ca2076e562d042a9580eff6452715737f53fd03b265ddca67bb3ef7dc9e51178fdd7d1e8492a03af19afe55712fd53d18db59c96d6fbe5322c639e80bbac117140832d5877c9d12826946403be1c1e4b428e59faf2b26d2f1e1fbbd430ed736c125c8f7e49703ddcb8b9b41bc70e2da1b11f34e767aeb26efeb6195ecf93e19c432dd249a50450fbcbbc9ad2a4ff3f4dae4a46856f74c07cd4a03d6ab9a1fc33a9dabd0b91434d03d35addb3a9c68314b1a0fa5a397cd0342bb7409a17d0b754a11597630714427543b3d249e382ea7b7c070c65f66f03c29e932bea67b0cbe827c3177513895976fb5ae2d646971c73e82aa2f6f91311519db6e4d4f2b1c108b96d6075493ba9fd4c1b24f18f871e63e6fe96e1e20dcc31903f5ef0544ec5a66ab7f83ea0bc01f29703588f89e4de705c25453df70c7106170ead044a2e03010dddee36f386f4c643bf9f5e68d921d6664811a81f5c25d30635321c730ecde0adcfab1d89c4754ed268a9ada6cc89b7d21605b25f5381f2810dfe0f19e91d165f3f956b6b8979e87f4752d7b4c4ca0dc88f1aced821d3d8732086338326d3cbab12a344c0749519d78fba0465f1176f6e227a2b641b5478ea3738291751ea2efe3ecd0e5490d32e7bf517b22385f7207262b201b2673c7dc40360c1fe4b76bddb8ec76510d1e6385b4daa106141db9d459990b4c3c707ea612d8e139f9308f48d48e6b03a13fae18c7c58c383e472dfcf28bbe899fbb9c7ca9f0eacf85e631be5014af8ce6218ddbd42bb1ff0e3c7ecb6ee57e28022b2516bc5514718c5a8eafb47920b4f68b1c8238bd4bb293c921acbccf613b62cb5a491f5ae2dc0ae71ecf6dc2e747961057ee1059a848ecb46c31f7e0bd27b656bf001c2e67392b845878ea3fe4fdd62039aa16665100d6dbaaacbfcd56b6651bba64c1dc70d84c5350a90f6e89298a94afa6dd724454fa2711559050d95f72ea3b4389363ebf2d95e2acbfea0c49ca1f70d329f53ff3744f29b4e332535bc06ffd1e59553e64604223a4d45ac5706036207395fd504c03e992508221436d9d14dbad999b863b25e75857703a522f711cada443fe138da23a8ba9487a21f2c0a472698cc1670933a3913f5678cc2fddc70fc7a9ce8f12ee3dadf22f1664068d124b670e92d23d0bbcbeeafce646a6cd998aeab4d9c97df343891149d3d8c1f60b94f7f085fc66deb454b872c42404f5f2a02c0b5e63db4df1257eb8cbe1082459295bd40f5efd35471b17b18bcab8f7c5703f45a516f577028a1add4e0f55c4f691ba94f6ab03e106ec888b933c9f25b18ff65ec7b2fe7a59b9b53a29e07eebe7d502f9ff497541d821fe40422965a6c7c761ce1400ab77b903040d1b000171d94781b30af6ce9545a52dbe39e90bf36ee7e19376c07aa1011ebc968148479dadbd628c092592b93094437ac66d5ab6fea2549939d1d55cacde4a7f22f0a3d4c8ab5117c68f889c452a6f86296f6b00039c31baf7f3af68a5bab76a7693e2a39593500db5ee73da5a1b56dea5777124e0a7f041bf98f65ac5911883f82283173c4f9db3a613c2be728c6d9fa4d789f1a4145cbd8cbe2abdfca15744314dc3b0826f5a1ce61df9c17faf75835848c729b2350d8785fe5d29a4028a0d2fb3dcd41cdc2c945a26935005a23e83fe0305e0e178da67e0b94edd12a39957fcce9f6a8ffa9f514193cde5892927881171868f33c5e55c92382639ae1a29defd79dfcc65c7e380254d2c2fc031fd43f218e631bb836df8041bcd9a4ff254eb04f05e17add3b9be145f1cde01aa2e1b1fbac2ec3d449ad4c05e1fb9da9624a45425e034f2322b9ad7f8ff6b4f499e248b6ccac3559bd54647c9f3d7b60a0da1d9752fdafd11f586e96c53e19c5a8f122ff6f418d419394d5e01f25d6caa9d8812031486008e318bc7fabedda31d0142e617a3afc4d0839bc723c5fd3a2bc4e7c197a83e740da12e2485e1de5f2bf7c000611b8ac05a1918abf90c276f61de9bf76ed5e97519439059c30a19e89eff6043d671665ef791066dd819d6e916ec026cc0090175d97950645787f321db165d7bf1c4821aabf5fdc51cd1bf0b07d1f3791995dfb89f99f4ab9f6d6d44b5cba5a9b661a53c951d98972ac43ea9eb0f3b5357eddcd366285493080cd486c88df81794160f97a422717112c96697c6d4480b9e96aab1304e8a2e459ff7ebd8e676ddc9cca80c53f04f9b8360b86e5356a9348ceea40ae74ed04d165f498cd3b8378ad5689ec2deb56c57640d550048f1105a7794a1d636a54272f0bb32e1b02553f57cba032865277b6d9d475babed8c344389fc6c4b25f85a2b5fb01b27a9a1ee473ca7abcaa5b89911c3ee978916967e63f304b12e2057cf071fc35632c64074036883b681756b0339501dcfaaf122f792c6edbdb5fcbb472a20869c6346b690e9e6c1ad25c297060e8f157494891f57ab3fb246f164c8dc1bbede515e809b2a4c40334814b6172ff308b9117fdeb2fb69768a7e81693977bf2a7ac9d0e86f0d4e5938cf45adde190de1e51f7810107ac6a70e960a370564054ef8529fcf5ee5c9821dda60a69ce0c2447f4e0205a7e3e0ad86327fffe4258cc7a330fa6b9758c21abe9a2768df52ec0aa09f4be1becd27e8fd16627c9cc9cb64421f0f2e5410cb1d63c1e6611b659092ba95c916547979d5a1bc4553f00f646d0896a54a0207a10e4d5208107c40142f377625254b7b63770794cdc02ca1f575b57af21828c665580be8da576db5d0f96d2000d04e628717fe9444b30122fde82db0dcbc44090f3666b29e3988826ae02dc0b8283e7838922535aac6e0bb8bf06d64a09c492fb8c6ba72911a8d74d517d63db33d1c82991229b861685670e2fd1291a07f3f06c1eaecd976227f974fc90163e0ccfacbdd475aaea8cefe326095e506ea9e7d8c7c8b3919420034ca80e6fe035a61b2c7ff6f61d66a0a9b38702fb1c403ddbb519a4252c2d78d888b4040f65d1bf9a6eaa0afe782005fcd726af8df2757c9d9d6614df894ca94ee1ddc84dad9e5e3765faf61c8150234fb39bb308a966eaf9d2243468dae1035938b82c51576ea0be346849fa2483956f0b9566368b449dd6cd650cc15ca73733c840602dac5c3e328734df9f9e21f7f99d0a69c2c5ed0263433df412b16f96c2e6ec04543d99e58f087830ba2b1d88693b3d22b0b456a6a1675a4d03dffdb6360028f7a97e68b470aad22bd77d892e8d98484987e18f403a12ffb1cc8bb2ddc6b8fc100bccd92d366c1cdbf9892c6216999c7d66564ba975dd4b29ee480713fc4fcc1860a898009e618cc2ec23a7e0adc40795f385c83e59bff1832b7769c813a8e4139412192c6c914c814c0d42c00f537b5cb1ac7357b06e533e97f3d3fde68db64400857477844908d6fd3f2dbc008f35cd4d76aa934c93fe1cd4c38cb9f15bd8e2a8e9c9c16837ddfc978fd9df45b204326060fd27154b5614329d9b118a9ecb406f2b49608aa94bf5dd27837104cf7e84821d9f42803f390a1cbe0533ad53a636121e57534afbe1970fd607ae96b82cbc8dbe913a0509195c05daad244c6a7d31991207aa5d579fcac74fbb00805557844f58a0eb40d70053ea64230009eba7df1c87ef942662847e9b10d6e2eff5967eeb18989d6dc7608246226dc5eb3d489e5a72d9ce91f9666d7c49f4761fb50fd2efabb15d939aeef76916344fb7fb1585f9cfb89a078250131fb28dee2f21d7b63daf1a0c1cd9affb4ee46f6aba84500b72efb942046d43c9e98280c2e00d9614956e2f5c504b11bc67915f3008a89ea5ad831cc5c0cc8af43a3b64356d785ed3ffe826a47681dc0228c508b167fab6139831209796c056558d53a398e9b14d5933e5a7e7fef0bd2a7e29d1d252e297cb32207bd6a77a36568c6ce154e74907afdf780850256e304972f0da61e74ee57e13fc5e506f6e52138189701c30e2d1b4bcdeb0dd78c36460276e87eec8c1b68430ab97d27274b6a0f10c5c1d9e145469a4098a52d8645696300aa799c8dbfaebbc85fd27a6e5f71aad64abd6002860f853b0187b36ec466a4c79ff2b7648adb851575f220865c6c675f344c2e800449d678910f3ad07341c9ed18f54a62b31e28216dc507938b4a9847b4686035702b662bd992e2050963112f0957d12ad25f7bc2e6fcdbddc0dfedf0e720df4103d922a76c27584b150b56ba30377dd518bf2e618159336c30328106b851705e25667c00b89d006eafeed49605089259ff64edea75d2b3007c6ba6aabe6d16188b0e541dcb4c86aa6970a191826d3afbf2caf98a9397187026ac8d94ccf2013ec8145df1124749bc58385b11c9afbbbfb2241df063f3a87c3b84188aae08cbd464638a1cfed1712ac7ed35ff63f0970454a6788fb5dd44db9fc666c38b93e52f59888aa4dc00330c042fdf55a89f8417e5afa0a5a5b76d2d5b60dba07798081cdccfc10f142a0f909b8b02b99f44ead8fdf6024561d36553185cf2d75b37e4a3daa1dfb1ab44a17dabbfbcbf24131c34cf55c283b8c2a2887bd127b0767b532217f14a36d8c0268acd47714145e2a080a953761e211caf7d5c56f67f9913398b508c8a20025316de6be510d7fd5409c55eec857794e8e3d49b3e86fc9233197bbb38bbc0d03ad7742c32d4ccadbee79ff2d5e695ea27494f49ad1467d4d944c0e932b98bf4eb0f36405938de1fe371ac900197700a8ba34f21a11d854b483ac0855552787ed3e2b44ee376b597c326f551178591da6959248020a40414b265378f42ae0914c82437d036e564699a08c3774ac84099e2f7283d3c3866577b9da133216d9bb38d3393735dd7c42f642413751fca8a7c4b514b0a9a9bc87b6926302f9846aaea8f59bacc7b6d9d50e7c5a442866a2f8425b300ff4696077c9415a2444490c41b6c2176ef10a8c7b32ddfde0d9d06c038f94672e724a6a59d6462a4da7fdc071d5bed12bf26341f64d375eca978adf7e519f6a219043cd5306d9979e0b5086f1a86fded37bc5d9054635debdb26fba2cdbc18a8441a33cbed8d0ffb79157d42bd42626e5a9067449f42be6d8007a43ad528473f68c15fe12f9031a7031c02500d0aea433df637229deda22a25633fd85b31e45f1ff59e2512adebb1f3a53550de5103b29531b226614fbe67f278cd31902d385ae45dcbb2666ac8c0e7d53bda87d3af4f50985e0216032b5fc55111d18f5bf97f279be885cceb3888770f3cb96bed661938309a0fc9126d7ae698180c783f6af971333ee93136171f3ccd3b462fc731b720ce9c4e96f0bbfb51e4fa468b78997cd7cab1206fbb3aacadce9c1afa3899e1fde9de35fa884d609aecc53dea82bef57fb1fd9f475977509e892a594c86879261d5c350e85ca258dfa348c121cd0f69ce6f6cc40bb79565ed156dc462e436d5efb56b79be8e0da94eef33ae6f5cbfbeb5511ff067d8de0eea0a27b69dfbf6b31489995d35395580839893a748e0ef8581b4f2d955b7595d62e134100322a61081f4b23be40a3dde87da3b2f7827a05d6fb999970fb600979aac04b22caf5378a41d2beb95d81768c27f4536663b22c0f06e1d995a40d3b0a527d980a5720038629e417048f3e089a00c910712c501f649dc34aec23e49ecbd84912cc4ac674b306697a8734a098e59f51dc52926ef6ef36924e3ca2491ef2cbf70bdc3bf0c1cdabf9ed08483debfcc6859085", 0x1000}, {&(0x7f0000002380)="3947c99b2499f10c86cf8e197bfcd444d8b60dd4f4e871cfdc9d6f8a8be8eff9786d907dd3fe50e0ee6ad6067543d4333fe7a67272ff1db9592f2e3e596cdb9672e0a866af8de1132e8292af6510a4c6f7ed4f96074d3edb5778798021cc084ae1fb7515ed9badea336458bf7ae3e36ce1731ef55573ca3a324845e83f1dc2bdaea2ab5c09fb8e3f5b6f4052cf861ea85fafdc70e38d9be13809f3ee6e9ea73decc4a03fe5b7bd77f1a84d4df5241407e50c73790bb76f", 0xb7}, {&(0x7f0000002440)="923e4f024c299c1202df0c3641e34a5d43ee56d7f682687a727fc02a5fe70963c658ac63159fcf74b990c190e134c0ae16395dfa598c8664ff7416b3af6e58467403e910009bd3e33a8b3455bcbcd0c55bf0921c4f5cc64abd516a97b5c0c8baf0500ee1fef283dbeceafb680849e3c3a97024ed885b0b6b84575466420910950cba7a6e2ccd6c01bb93b9786db2c8833619f0edfcf579b6507d8bc55812b81cdc4ee68d0e3c941ef20d298b7ce5b3e5", 0xb0}], 0x3, &(0x7f0000002540)=[{0x10, 0x6, 0x10}, {0xc8, 0xff, 0x2, "d908c86aea3511ed2198049e222e6e60301caaf863f7f1dc69d44a637a39c5521a94b4c0dc76601b7ccfd9ac6e574e5d126f345e3513394d15802a3188c184320d5f015ca00e662c059edea5805034768aa5314d02ca77e5c133dbe7a04d5970883e760c193125bff0830d87a4cf2e0bd75ab58c4e7bee62aa4dd60b8dc35d0cb9966be14dab58bcaa6399f19cf467219f590c1fa339e5fac56bc625000449a07c2ae8809b56ba995f94933a63da2bc46737e155"}, {0x10, 0x109}, {0xa0, 0x0, 0x5, "098c28026103c557aa1d8e39adb581c1c1ab9dc54abcaa7652b42fc17feba125b7649887abf5c9e26152154a2bc70211fc4cc15055ca970704e3adef017c2ba97454543c4f340e28a6caf3c1af3adce953ca4650c742f78f0904d310c411a8f0d9040aeb67f9c88bdd8c4907e44bc729b43c72f4495ace3b60993f0ee4494cd1c024817ad9e9ac6ba4f014807df7b214"}], 0x188, 0x8000}, 0x40050) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000009c0)="ab570cecadf3826cc96e02fb9699b53229fdc65f19152679349ce95405a902e352a78eccb8e9c3c8f98d744a5a399ab816a758d2946f22582e1bc4b587089b019aa2", 0x42}, {&(0x7f0000000a40)="12f61089e4ba77e673b01b16a05d6ba4bba1bc85597d096099c4a6ff4f55c9f2817595bbc740c8dffa7d6e8b1b44e705ba75f10862e0f7d1f3b88c1ec3c69505f6f1fae4aba00a8a4aaa", 0x4a}, {&(0x7f00000004c0)="4193819e38ebf0cb59af9c07f0739f18f406096aa8f8", 0x16}, {&(0x7f0000000ac0)="37241e170b8c4d00e0f85fc7602ba39b16555696b630162ac41d6c593f9ffabc1d4e34756afcaafbefe7e650f0effc544f32c1b96e6496a315f188a59f0c1af85ee3276e6c0ec3460367f5fe1ff31c06ad3c50389a5daff8e011923cbfe71e74c4f4088e7bc6e45b02dd0f9db87050b1c2628d1dc38ed2c2e1a3498af1d19c9b436503a922e00910b5a455455bfd220fe9be8d", 0x93}], 0x4, &(0x7f00000003c0)=ANY=[]}, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) recvmsg(r3, &(0x7f00000011c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f0000001040)=[{&(0x7f00000003c0)=""/55, 0x37}, {&(0x7f0000000c00)=""/230, 0xe6}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/7, 0x7}, {&(0x7f0000000d40)=""/249, 0xf9}, {&(0x7f0000000e40)=""/252, 0xfc}, {&(0x7f0000000f40)=""/66, 0x42}, {&(0x7f0000000fc0)=""/107, 0x6b}], 0x8, &(0x7f00000010c0)=""/250, 0xfa, 0x5}, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000180)='./file1/file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r2) recvmsg(r3, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:20 executing program 5 (fault-call:18 fault-nth:22): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 154.181228] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 2018/03/30 19:41:20 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x0, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:20 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 154.267572] autofs4:pid:10291:autofs4_fill_super: called with bogus options [ 154.278383] autofs4:pid:10292:autofs4_fill_super: called with bogus options [ 154.556464] FAULT_INJECTION: forcing a failure. [ 154.556464] name failslab, interval 1, probability 0, space 0, times 0 [ 154.567872] CPU: 0 PID: 10302 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 154.575164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.584533] Call Trace: [ 154.587137] dump_stack+0x194/0x24d [ 154.590789] ? arch_local_irq_restore+0x53/0x53 [ 154.595521] should_fail+0x8c0/0xa40 [ 154.599260] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 154.604411] ? kasan_kmalloc+0xad/0xe0 [ 154.608310] ? __kmalloc+0x162/0x760 [ 154.612036] ? __list_lru_init+0xcf/0x750 [ 154.616193] ? find_held_lock+0x35/0x1d0 [ 154.620256] ? __lock_is_held+0xb6/0x140 [ 154.624333] ? check_same_owner+0x320/0x320 [ 154.628664] ? rcu_note_context_switch+0x710/0x710 [ 154.633596] should_failslab+0xec/0x120 [ 154.637562] kmem_cache_alloc_node_trace+0x5a/0x760 [ 154.642581] ? mark_held_locks+0xaf/0x100 [ 154.646729] ? __raw_spin_lock_init+0x1c/0x100 [ 154.651321] __kmalloc_node+0x33/0x70 [ 154.655130] kvmalloc_node+0x99/0xd0 [ 154.658836] __list_lru_init+0x5d5/0x750 [ 154.662897] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 154.668789] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 154.673814] ? lockdep_init_map+0x9/0x10 [ 154.677869] sget_userns+0x6b1/0xe40 [ 154.681570] ? kernfs_sop_show_path+0x190/0x190 [ 154.686245] ? kernfs_sop_show_options+0x180/0x180 [ 154.691173] ? destroy_unused_super.part.6+0xd0/0xd0 [ 154.696281] ? check_same_owner+0x320/0x320 [ 154.700587] ? rcu_pm_notify+0xc0/0xc0 [ 154.704482] ? rcu_read_lock_sched_held+0x108/0x120 [ 154.709498] ? kmem_cache_alloc_trace+0x459/0x740 [ 154.714330] ? lock_downgrade+0x980/0x980 [ 154.718474] kernfs_mount_ns+0x13d/0x8b0 [ 154.722528] ? kernfs_super_ns+0x70/0x70 [ 154.726610] sysfs_mount+0xc2/0x1c0 [ 154.730227] ? sysfs_kill_sb+0x40/0x40 [ 154.734102] ? alloc_pages_current+0xbe/0x1e0 [ 154.738608] ? security_sb_copy_data+0x81/0xb0 [ 154.743207] mount_fs+0x66/0x2d0 [ 154.746583] vfs_kern_mount.part.26+0xc6/0x4a0 [ 154.751153] ? may_umount+0xa0/0xa0 [ 154.754772] ? _raw_read_unlock+0x22/0x30 [ 154.758903] ? __get_fs_type+0x8a/0xc0 [ 154.762782] do_mount+0xea4/0x2bb0 [ 154.766323] ? copy_mount_string+0x40/0x40 [ 154.770559] ? rcu_pm_notify+0xc0/0xc0 [ 154.774440] ? copy_mount_options+0x5f/0x2e0 [ 154.778834] ? rcu_read_lock_sched_held+0x108/0x120 [ 154.783843] ? kmem_cache_alloc_trace+0x459/0x740 [ 154.788683] ? copy_mount_options+0x1f7/0x2e0 [ 154.793178] SyS_mount+0xab/0x120 [ 154.796612] ? copy_mnt_ns+0xb30/0xb30 [ 154.800490] do_syscall_64+0x281/0x940 [ 154.804371] ? vmalloc_sync_all+0x30/0x30 [ 154.808505] ? _raw_spin_unlock_irq+0x27/0x70 [ 154.812987] ? finish_task_switch+0x1c1/0x7e0 [ 154.817471] ? syscall_return_slowpath+0x550/0x550 [ 154.822383] ? syscall_return_slowpath+0x2ac/0x550 [ 154.827300] ? prepare_exit_to_usermode+0x350/0x350 [ 154.832304] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 154.837659] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 154.842497] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 154.847679] RIP: 0033:0x454e79 [ 154.850863] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 154.858555] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 154.865809] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 154.873071] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 154.880332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 154.887587] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 2018/03/30 19:41:20 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:20 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x4, 0x80b, 0x1, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f00000003c0)={&(0x7f0000000340)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000180)=[{&(0x7f00000009c0)=""/170, 0xaa}], 0x1, &(0x7f0000000a80)=""/250, 0xfa, 0x5}, 0x40000000) recvmsg(r1, &(0x7f0000003500)={&(0x7f0000002200)=@can={0x0, 0x0}, 0x80, &(0x7f0000003400)=[{&(0x7f0000002280)=""/179, 0xb3}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000003340)=""/51, 0x33}, {&(0x7f0000003380)=""/99, 0x63}], 0x4, &(0x7f0000003440)=""/169, 0xa9, 0x100000000}, 0x40002020) bpf$PROG_LOAD(0x5, &(0x7f0000003540)={0x5, 0x13, &(0x7f0000000b80)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x7fffffff}, [@jmp={0x5, 0x8, 0xb, 0x5, 0x2, 0xfffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800}, @ldst={0x3, 0x3, 0x1, 0xb, 0xa, 0x100, 0xfffffffffffffffc}, @call={0x85}, @alu={0x4, 0x80000000, 0x7, 0x9, 0x7, 0x22, 0xfffffffffffffff0}, @generic={0x1f, 0x2, 0x81, 0x20000000000000}, @ldst={0x1, 0x0, 0x6, 0x8, 0x1, 0x6, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0xfffffffffffffffd}], {0x95}}, &(0x7f00000004c0)='GPL\x00', 0x3, 0xe4, &(0x7f0000000c40)=""/228, 0x41f00, 0x1, [], r4}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r0, &(0x7f00000005c0), &(0x7f0000000600)=""/204}, 0x18) socketpair(0x0, 0xe, 0x5, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r5, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x2ce}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f0000000e00)=""/255, 0xff}, {&(0x7f0000000d40)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xbb, 0x8}, 0x20) 2018/03/30 19:41:20 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:20 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:20 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:20 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x0, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:20 executing program 5 (fault-call:18 fault-nth:23): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:20 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x0, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 155.014206] autofs4:pid:10308:autofs4_fill_super: called with bogus options [ 155.030404] autofs4:pid:10309:autofs4_fill_super: called with bogus options 2018/03/30 19:41:21 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x0, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 155.309277] FAULT_INJECTION: forcing a failure. [ 155.309277] name failslab, interval 1, probability 0, space 0, times 0 [ 155.320736] CPU: 0 PID: 10334 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 155.328025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 155.337388] Call Trace: [ 155.339978] dump_stack+0x194/0x24d [ 155.343616] ? arch_local_irq_restore+0x53/0x53 [ 155.348308] should_fail+0x8c0/0xa40 [ 155.352042] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 155.357148] ? kasan_kmalloc+0xad/0xe0 [ 155.361040] ? kmem_cache_alloc_trace+0x136/0x740 [ 155.365885] ? __memcg_init_list_lru_node+0x169/0x270 [ 155.371089] ? sget_userns+0x6b1/0xe40 [ 155.374975] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 155.379716] ? do_mount+0xea4/0x2bb0 [ 155.383422] ? SyS_mount+0xab/0x120 [ 155.387058] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 155.392441] ? find_held_lock+0x35/0x1d0 [ 155.396513] ? __lock_is_held+0xb6/0x140 [ 155.400581] ? check_same_owner+0x320/0x320 [ 155.405321] ? rcu_note_context_switch+0x710/0x710 [ 155.410266] should_failslab+0xec/0x120 [ 155.414231] kmem_cache_alloc_trace+0x4b/0x740 [ 155.418820] ? __kmalloc_node+0x33/0x70 [ 155.422794] ? __kmalloc_node+0x33/0x70 [ 155.426767] ? rcu_read_lock_sched_held+0x108/0x120 [ 155.431803] __memcg_init_list_lru_node+0x169/0x270 [ 155.436825] ? list_lru_add+0x7c0/0x7c0 [ 155.440802] ? __kmalloc_node+0x47/0x70 [ 155.444793] __list_lru_init+0x544/0x750 [ 155.448855] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 155.454741] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 155.459761] ? lockdep_init_map+0x9/0x10 [ 155.463813] sget_userns+0x6b1/0xe40 [ 155.467520] ? kernfs_sop_show_path+0x190/0x190 [ 155.472179] ? kernfs_sop_show_options+0x180/0x180 [ 155.477105] ? destroy_unused_super.part.6+0xd0/0xd0 [ 155.482215] ? check_same_owner+0x320/0x320 [ 155.486535] ? rcu_pm_notify+0xc0/0xc0 [ 155.490420] ? rcu_read_lock_sched_held+0x108/0x120 [ 155.495430] ? kmem_cache_alloc_trace+0x459/0x740 [ 155.500280] ? lock_downgrade+0x980/0x980 [ 155.504459] kernfs_mount_ns+0x13d/0x8b0 [ 155.508520] ? kernfs_super_ns+0x70/0x70 [ 155.512578] sysfs_mount+0xc2/0x1c0 [ 155.516191] ? sysfs_kill_sb+0x40/0x40 [ 155.520077] ? alloc_pages_current+0xbe/0x1e0 [ 155.524583] ? security_sb_copy_data+0x81/0xb0 [ 155.529173] mount_fs+0x66/0x2d0 [ 155.532528] vfs_kern_mount.part.26+0xc6/0x4a0 [ 155.537097] ? may_umount+0xa0/0xa0 [ 155.540721] ? _raw_read_unlock+0x22/0x30 [ 155.544864] ? __get_fs_type+0x8a/0xc0 [ 155.548741] do_mount+0xea4/0x2bb0 [ 155.552271] ? copy_mount_string+0x40/0x40 [ 155.556489] ? rcu_pm_notify+0xc0/0xc0 [ 155.560380] ? copy_mount_options+0x5f/0x2e0 [ 155.564774] ? rcu_read_lock_sched_held+0x108/0x120 [ 155.569777] ? kmem_cache_alloc_trace+0x459/0x740 [ 155.574622] ? kasan_check_write+0x14/0x20 [ 155.578860] ? _copy_from_user+0x99/0x110 [ 155.583033] ? copy_mount_options+0x1f7/0x2e0 [ 155.587529] SyS_mount+0xab/0x120 [ 155.590974] ? copy_mnt_ns+0xb30/0xb30 [ 155.594854] do_syscall_64+0x281/0x940 [ 155.598730] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 155.604256] ? syscall_return_slowpath+0x550/0x550 [ 155.609170] ? syscall_return_slowpath+0x2ac/0x550 [ 155.614109] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 155.619477] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 155.624313] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 155.629493] RIP: 0033:0x454e79 [ 155.632665] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 155.640360] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 155.647612] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 155.654867] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 155.662646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 155.669923] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 [ 155.725454] autofs4:pid:10340:autofs4_fill_super: called with bogus options [ 155.743518] autofs4:pid:10341:autofs4_fill_super: called with bogus options 2018/03/30 19:41:22 executing program 5 (fault-call:18 fault-nth:24): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:22 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$inet(0x2, 0x1, 0x8, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000340)={r2}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000380)=r1, 0x4) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r0) recvmsg(r3, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:22 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, 0xffffffffffffffff, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:22 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:22 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:22 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:22 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:22 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) [ 156.184331] autofs4:pid:10357:autofs4_fill_super: called with bogus options [ 156.214283] autofs4:pid:10367:autofs4_fill_super: called with bogus options [ 156.255155] FAULT_INJECTION: forcing a failure. [ 156.255155] name failslab, interval 1, probability 0, space 0, times 0 [ 156.266461] CPU: 1 PID: 10358 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 156.273738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.283089] Call Trace: [ 156.285682] dump_stack+0x194/0x24d [ 156.289321] ? arch_local_irq_restore+0x53/0x53 [ 156.294004] should_fail+0x8c0/0xa40 [ 156.297727] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/03/30 19:41:22 executing program 6: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 156.302840] ? kasan_kmalloc+0xad/0xe0 [ 156.306732] ? __kmalloc+0x162/0x760 [ 156.310443] ? __list_lru_init+0xcf/0x750 [ 156.314594] ? find_held_lock+0x35/0x1d0 [ 156.318661] ? __lock_is_held+0xb6/0x140 [ 156.322738] ? check_same_owner+0x320/0x320 [ 156.327063] ? rcu_note_context_switch+0x710/0x710 [ 156.332001] should_failslab+0xec/0x120 [ 156.335987] kmem_cache_alloc_node_trace+0x5a/0x760 [ 156.341001] ? mark_held_locks+0xaf/0x100 [ 156.345150] ? __raw_spin_lock_init+0x1c/0x100 [ 156.349744] __kmalloc_node+0x33/0x70 2018/03/30 19:41:22 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, 0xffffffffffffffff, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 156.353552] kvmalloc_node+0x99/0xd0 [ 156.357276] __list_lru_init+0x5d5/0x750 [ 156.361340] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 156.367226] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 156.372252] ? lockdep_init_map+0x9/0x10 [ 156.376320] sget_userns+0x6b1/0xe40 [ 156.380033] ? kernfs_sop_show_path+0x190/0x190 [ 156.384715] ? kernfs_sop_show_options+0x180/0x180 [ 156.389987] ? destroy_unused_super.part.6+0xd0/0xd0 [ 156.395084] ? check_same_owner+0x320/0x320 [ 156.399392] ? rcu_pm_notify+0xc0/0xc0 [ 156.403270] ? rcu_read_lock_sched_held+0x108/0x120 [ 156.408272] ? kmem_cache_alloc_trace+0x459/0x740 [ 156.413090] ? lock_downgrade+0x980/0x980 [ 156.417225] kernfs_mount_ns+0x13d/0x8b0 [ 156.421267] ? kernfs_super_ns+0x70/0x70 [ 156.425312] sysfs_mount+0xc2/0x1c0 [ 156.428915] ? sysfs_kill_sb+0x40/0x40 [ 156.432781] ? alloc_pages_current+0xbe/0x1e0 [ 156.437254] ? security_sb_copy_data+0x81/0xb0 [ 156.441812] mount_fs+0x66/0x2d0 [ 156.445158] vfs_kern_mount.part.26+0xc6/0x4a0 [ 156.449717] ? may_umount+0xa0/0xa0 [ 156.453321] ? _raw_read_unlock+0x22/0x30 [ 156.457443] ? __get_fs_type+0x8a/0xc0 [ 156.461311] do_mount+0xea4/0x2bb0 [ 156.464831] ? copy_mount_string+0x40/0x40 [ 156.469042] ? rcu_pm_notify+0xc0/0xc0 [ 156.472911] ? copy_mount_options+0x5f/0x2e0 [ 156.477295] ? rcu_read_lock_sched_held+0x108/0x120 [ 156.482286] ? kmem_cache_alloc_trace+0x459/0x740 [ 156.487107] ? kasan_check_write+0x14/0x20 [ 156.491320] ? copy_mount_options+0x1f7/0x2e0 [ 156.495794] SyS_mount+0xab/0x120 [ 156.499223] ? copy_mnt_ns+0xb30/0xb30 [ 156.503088] do_syscall_64+0x281/0x940 [ 156.506952] ? vmalloc_sync_all+0x30/0x30 [ 156.511072] ? _raw_spin_unlock_irq+0x27/0x70 [ 156.515543] ? finish_task_switch+0x1c1/0x7e0 [ 156.520018] ? syscall_return_slowpath+0x550/0x550 [ 156.524925] ? syscall_return_slowpath+0x2ac/0x550 [ 156.529834] ? prepare_exit_to_usermode+0x350/0x350 [ 156.534825] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 156.540171] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 156.544995] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 156.550163] RIP: 0033:0x454e79 [ 156.553327] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 156.561016] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 156.568265] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 156.576292] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 156.583538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 156.590784] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 2018/03/30 19:41:22 executing program 5 (fault-call:18 fault-nth:25): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:22 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0x0, 0x6a, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={r0, &(0x7f0000000340)="cbf3916da212c7be4d1a84d5faf447383c840a0ed662a721d65838470b78ea6aa7d8b327bd07a3d385377bee50e4201d563afcb4465004415bb7a582a6ab20c17d437fe66656818b5c7f1b340f263d4d371f914d57531cad68d3b43eed9119a87e01ed6a00f262b40dfdc65de4b23de062290934ac325ab6f43f710678a81242e64ece798c97788214cc5b4c11596f14a90666339676110d029aa7a1562592875b0e8425f186b4cb05cf57dff1fc332278b2a03b7af036b6d182eb4f18", &(0x7f00000009c0)=""/157}, 0x18) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r4, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000940)=""/17, 0x11}, {&(0x7f0000000a80)=""/18, 0x12}], 0x2, &(0x7f0000000b00)=""/220, 0xdc, 0x4}, 0x2001) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) recvmsg(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 156.631307] autofs4:pid:10384:autofs4_fill_super: called with bogus options [ 156.649940] autofs4:pid:10384:autofs4_fill_super: called with bogus options 2018/03/30 19:41:22 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, 0xffffffffffffffff, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 156.940618] autofs4:pid:10403:autofs4_fill_super: called with bogus options [ 156.953128] autofs4:pid:10404:autofs4_fill_super: called with bogus options [ 156.964599] FAULT_INJECTION: forcing a failure. [ 156.964599] name failslab, interval 1, probability 0, space 0, times 0 [ 156.976011] CPU: 0 PID: 10401 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 156.983301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.992653] Call Trace: [ 156.995251] dump_stack+0x194/0x24d [ 156.998882] ? arch_local_irq_restore+0x53/0x53 [ 157.003574] should_fail+0x8c0/0xa40 [ 157.007289] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 157.012383] ? kasan_kmalloc+0xad/0xe0 [ 157.016253] ? kmem_cache_alloc_trace+0x136/0x740 [ 157.021092] ? __memcg_init_list_lru_node+0x169/0x270 [ 157.026280] ? sget_userns+0x6b1/0xe40 [ 157.030160] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 157.034903] ? do_mount+0xea4/0x2bb0 [ 157.038614] ? SyS_mount+0xab/0x120 [ 157.042228] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 157.047604] ? find_held_lock+0x35/0x1d0 [ 157.051679] ? __lock_is_held+0xb6/0x140 [ 157.055758] ? check_same_owner+0x320/0x320 [ 157.060074] ? rcu_note_context_switch+0x710/0x710 [ 157.065018] should_failslab+0xec/0x120 [ 157.068996] kmem_cache_alloc_trace+0x4b/0x740 [ 157.073596] ? __kmalloc_node+0x33/0x70 [ 157.077575] ? __kmalloc_node+0x33/0x70 [ 157.081553] ? rcu_read_lock_sched_held+0x108/0x120 [ 157.086575] __memcg_init_list_lru_node+0x169/0x270 [ 157.091590] ? list_lru_add+0x7c0/0x7c0 [ 157.095566] ? __kmalloc_node+0x47/0x70 [ 157.099569] __list_lru_init+0x544/0x750 [ 157.103632] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 157.109502] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 157.114528] ? lockdep_init_map+0x9/0x10 [ 157.118595] sget_userns+0x6b1/0xe40 [ 157.122306] ? kernfs_sop_show_path+0x190/0x190 [ 157.126989] ? kernfs_sop_show_options+0x180/0x180 [ 157.131913] ? destroy_unused_super.part.6+0xd0/0xd0 [ 157.137027] ? check_same_owner+0x320/0x320 [ 157.141355] ? rcu_pm_notify+0xc0/0xc0 [ 157.145274] ? rcu_read_lock_sched_held+0x108/0x120 [ 157.150297] ? kmem_cache_alloc_trace+0x459/0x740 [ 157.155146] ? lock_downgrade+0x980/0x980 [ 157.159332] kernfs_mount_ns+0x13d/0x8b0 [ 157.163389] ? kernfs_super_ns+0x70/0x70 [ 157.167447] sysfs_mount+0xc2/0x1c0 [ 157.171066] ? sysfs_kill_sb+0x40/0x40 [ 157.174946] ? alloc_pages_current+0xbe/0x1e0 [ 157.179429] ? security_sb_copy_data+0x81/0xb0 [ 157.184000] mount_fs+0x66/0x2d0 [ 157.187380] vfs_kern_mount.part.26+0xc6/0x4a0 [ 157.191958] ? may_umount+0xa0/0xa0 [ 157.195571] ? _raw_read_unlock+0x22/0x30 [ 157.199705] ? __get_fs_type+0x8a/0xc0 [ 157.203607] do_mount+0xea4/0x2bb0 [ 157.207177] ? copy_mount_string+0x40/0x40 [ 157.211415] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 157.216442] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 157.221227] ? retint_kernel+0x10/0x10 [ 157.225116] ? copy_mount_options+0x149/0x2e0 [ 157.229598] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 157.234426] ? copy_mount_options+0x1f7/0x2e0 [ 157.238923] SyS_mount+0xab/0x120 [ 157.242377] ? copy_mnt_ns+0xb30/0xb30 [ 157.246250] do_syscall_64+0x281/0x940 [ 157.250121] ? vmalloc_sync_all+0x30/0x30 [ 157.254254] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 157.259788] ? syscall_return_slowpath+0x550/0x550 [ 157.264705] ? syscall_return_slowpath+0x2ac/0x550 [ 157.269628] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 157.274996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 157.279866] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 157.285060] RIP: 0033:0x454e79 2018/03/30 19:41:23 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:23 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) r0 = perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x8, 0xffffffffffffffff, 0x3, 0x9, 0x0, 0x2, 0x102, 0x9, 0x0, 0x3863, 0x2, 0xc9, 0x4, 0x400, 0x20, 0xd8, 0xfffffffffffffffc, 0x4, 0x3ff, 0x2, 0x100, 0x7, 0x0, 0x1f, 0x6, 0x2, 0x4, 0x3, 0x1, 0x9, 0x3, 0x7, 0x5, 0x10000, 0x3f, 0x6ec, 0x0, 0x1, 0x2, @perf_config_ext={0x0, 0x8001}, 0x2088, 0x40, 0x80, 0x4, 0x100000000, 0x1}, 0x0, 0xd, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000180)) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r1) recvmsg(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:23 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:23 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:23 executing program 5 (fault-call:18 fault-nth:26): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:23 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) [ 157.288255] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 157.295974] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 157.303250] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 157.310527] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 157.317794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 157.325052] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 2018/03/30 19:41:23 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:23 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:23 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) mount(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='openpromfs\x00', 0x8, &(0x7f00000009c0)="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") r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0x3) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) close(r2) [ 157.697557] autofs4:pid:10432:autofs4_fill_super: called with bogus options [ 157.727008] autofs4:pid:10439:autofs4_fill_super: called with bogus options [ 157.766762] FAULT_INJECTION: forcing a failure. [ 157.766762] name failslab, interval 1, probability 0, space 0, times 0 [ 157.778308] CPU: 0 PID: 10433 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 157.785589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.794936] Call Trace: [ 157.797526] dump_stack+0x194/0x24d [ 157.801147] ? arch_local_irq_restore+0x53/0x53 [ 157.805871] should_fail+0x8c0/0xa40 [ 157.809581] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 157.814685] ? kasan_kmalloc+0xad/0xe0 [ 157.818558] ? kmem_cache_alloc_trace+0x136/0x740 [ 157.823395] ? __memcg_init_list_lru_node+0x169/0x270 [ 157.828584] ? sget_userns+0x6b1/0xe40 [ 157.832473] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 157.837217] ? do_mount+0xea4/0x2bb0 [ 157.840927] ? SyS_mount+0xab/0x120 [ 157.844557] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 157.849943] ? find_held_lock+0x35/0x1d0 [ 157.854014] ? __lock_is_held+0xb6/0x140 [ 157.858112] ? check_same_owner+0x320/0x320 [ 157.862442] ? rcu_note_context_switch+0x710/0x710 [ 157.867397] should_failslab+0xec/0x120 [ 157.871377] kmem_cache_alloc_trace+0x4b/0x740 [ 157.875954] ? __kmalloc_node+0x33/0x70 [ 157.879917] ? __kmalloc_node+0x33/0x70 [ 157.883877] ? rcu_read_lock_sched_held+0x108/0x120 [ 157.888888] __memcg_init_list_lru_node+0x169/0x270 [ 157.893911] ? list_lru_add+0x7c0/0x7c0 [ 157.897876] ? __kmalloc_node+0x47/0x70 [ 157.901861] __list_lru_init+0x544/0x750 [ 157.905933] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 157.911809] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 157.916838] ? lockdep_init_map+0x9/0x10 [ 157.920900] sget_userns+0x6b1/0xe40 [ 157.924613] ? kernfs_sop_show_path+0x190/0x190 [ 157.929277] ? kernfs_sop_show_options+0x180/0x180 [ 157.934200] ? destroy_unused_super.part.6+0xd0/0xd0 [ 157.939311] ? check_same_owner+0x320/0x320 [ 157.943617] ? rcu_pm_notify+0xc0/0xc0 [ 157.947506] ? rcu_read_lock_sched_held+0x108/0x120 [ 157.952515] ? kmem_cache_alloc_trace+0x459/0x740 [ 157.957355] ? lock_downgrade+0x980/0x980 [ 157.961511] kernfs_mount_ns+0x13d/0x8b0 [ 157.965575] ? kernfs_super_ns+0x70/0x70 [ 157.969647] sysfs_mount+0xc2/0x1c0 [ 157.973270] ? sysfs_kill_sb+0x40/0x40 [ 157.977162] ? alloc_pages_current+0xbe/0x1e0 [ 157.981656] ? security_sb_copy_data+0x81/0xb0 [ 157.986244] mount_fs+0x66/0x2d0 [ 157.989608] vfs_kern_mount.part.26+0xc6/0x4a0 [ 157.994198] ? may_umount+0xa0/0xa0 [ 157.997811] ? _raw_read_unlock+0x22/0x30 [ 158.001942] ? __get_fs_type+0x8a/0xc0 [ 158.005835] do_mount+0xea4/0x2bb0 [ 158.009392] ? copy_mount_string+0x40/0x40 [ 158.013625] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 158.018636] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 158.023405] ? retint_kernel+0x10/0x10 [ 158.027292] ? copy_mount_options+0x149/0x2e0 [ 158.031775] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 158.036618] ? copy_mount_options+0x1f7/0x2e0 [ 158.041123] SyS_mount+0xab/0x120 [ 158.044582] ? copy_mnt_ns+0xb30/0xb30 [ 158.048465] do_syscall_64+0x281/0x940 [ 158.052340] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 158.057860] ? syscall_return_slowpath+0x550/0x550 [ 158.062775] ? syscall_return_slowpath+0x2ac/0x550 [ 158.067699] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 158.073058] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 158.077894] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 158.083080] RIP: 0033:0x454e79 [ 158.086263] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 158.093964] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 158.101228] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 158.108515] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 2018/03/30 19:41:24 executing program 5 (fault-call:18 fault-nth:27): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 158.115770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 158.123035] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a 2018/03/30 19:41:24 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 158.382379] autofs4:pid:10449:autofs4_fill_super: called with bogus options [ 158.396804] FAULT_INJECTION: forcing a failure. [ 158.396804] name failslab, interval 1, probability 0, space 0, times 0 [ 158.408087] CPU: 1 PID: 10450 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 158.413430] autofs4:pid:10453:autofs4_fill_super: called with bogus options [ 158.415351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 158.415357] Call Trace: [ 158.415375] dump_stack+0x194/0x24d [ 158.415391] ? arch_local_irq_restore+0x53/0x53 [ 158.415402] ? __save_stack_trace+0x7e/0xd0 [ 158.415422] should_fail+0x8c0/0xa40 [ 158.415436] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 158.415449] ? kasan_kmalloc+0xad/0xe0 [ 158.415459] ? kmem_cache_alloc_trace+0x136/0x740 [ 158.415468] ? __memcg_init_list_lru_node+0x169/0x270 [ 158.415476] ? __list_lru_init+0x544/0x750 [ 158.415484] ? sget_userns+0x6b1/0xe40 [ 158.415494] ? vfs_kern_mount.part.26+0xc6/0x4a0 2018/03/30 19:41:24 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r0}) socketpair$inet6(0xa, 0x6, 0x8, &(0x7f0000000cc0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r2, 0x6, 0x10}, 0xc) sendmsg$kcm(r1, &(0x7f0000000940)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @my=0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000009c0)="d1f9a347e7557ee6a4b14b2e53c3c4cc846eed6059bc81f99af6905dc6a352cf215f347c716c09e254c2259bfcac4e8041e4061638d9d6cb16c7a858ba699de26bfa512fe8fac2d7a9ffda3a9b0585d58b655a18f4c52804882f5928cb9850111398b3dff345d92bdf923179c54f7386bef6e78d2787c4d7908528", 0x7b}, {&(0x7f0000000a40)="c50755cd6c768f7bc023aaa5114b8121811f366c87acd454a2ab47d219c2c336bd5ffaffc577ea5dda7ed74cf35b043451a40a260d223d27bb34d372ca225efdf43779d56fcdc77e7134dc1df2c137d195129029cc2740d71d71ba036b07e7386c36b6f8ce172a8bca194d9cf8e0d5cb713a6a142290ed5ae2ef70a931b745212b5dcab6cc492e4f2dca29603d2e9d12c40e9bc3b8788f0fd5b34571db9b3f96094ffc561e56aff75b3e6991065f4fd848e9c2e7b4ed44cdc0745b395c2ad8a4d00794b1f8", 0xc5}, {&(0x7f00000003c0)="2637ef53cf09ec20", 0x8}], 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x180, 0xc080}, 0x801) r3 = getpid() socketpair(0x0, 0x5, 0x6, &(0x7f0000000080)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x1, 0x7, 0xd6e8, 0x9, 0x0, 0x4, 0x21001, 0x1, 0x10001, 0x1f, 0x9, 0x100000000, 0x8, 0x8000000, 0x5, 0x1, 0xd7f, 0xff, 0x8, 0xffffffffffff7fff, 0x80000000, 0x3, 0xfff, 0x1e, 0xd79, 0x0, 0x3c4, 0x3, 0x183, 0x7fff, 0xffffffffffffffff, 0x3, 0x10000, 0x480000000000000, 0x390, 0x9, 0x0, 0x81, 0x2, @perf_config_ext={0x2, 0x9}, 0x2403, 0x4, 0x0, 0x5, 0x0, 0x3, 0x9}, r3, 0x10, r4, 0xa) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) [ 158.415504] ? do_mount+0xea4/0x2bb0 [ 158.486222] ? SyS_mount+0xab/0x120 [ 158.489850] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 158.495220] ? find_held_lock+0x35/0x1d0 [ 158.499287] ? __lock_is_held+0xb6/0x140 [ 158.503358] ? check_same_owner+0x320/0x320 [ 158.507683] ? rcu_note_context_switch+0x710/0x710 [ 158.512619] should_failslab+0xec/0x120 [ 158.516600] kmem_cache_alloc_trace+0x4b/0x740 [ 158.521188] ? __kmalloc_node+0x33/0x70 [ 158.525160] ? __kmalloc_node+0x33/0x70 2018/03/30 19:41:24 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 158.529132] ? rcu_read_lock_sched_held+0x108/0x120 [ 158.534151] __memcg_init_list_lru_node+0x169/0x270 [ 158.539174] ? list_lru_add+0x7c0/0x7c0 [ 158.543150] ? __kmalloc_node+0x47/0x70 [ 158.547131] __list_lru_init+0x544/0x750 [ 158.551193] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 158.557079] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 158.562097] ? lockdep_init_map+0x9/0x10 [ 158.566158] sget_userns+0x6b1/0xe40 [ 158.569866] ? kernfs_sop_show_path+0x190/0x190 [ 158.574539] ? kernfs_sop_show_options+0x180/0x180 2018/03/30 19:41:24 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) [ 158.579467] ? destroy_unused_super.part.6+0xd0/0xd0 [ 158.584573] ? check_same_owner+0x320/0x320 [ 158.588893] ? rcu_pm_notify+0xc0/0xc0 [ 158.592784] ? rcu_read_lock_sched_held+0x108/0x120 [ 158.597796] ? kmem_cache_alloc_trace+0x459/0x740 [ 158.602639] ? lock_downgrade+0x980/0x980 [ 158.606790] kernfs_mount_ns+0x13d/0x8b0 [ 158.610847] ? kernfs_super_ns+0x70/0x70 [ 158.614910] sysfs_mount+0xc2/0x1c0 [ 158.618526] ? sysfs_kill_sb+0x40/0x40 [ 158.622411] ? alloc_pages_current+0xbe/0x1e0 [ 158.626906] ? security_sb_copy_data+0x81/0xb0 2018/03/30 19:41:24 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) [ 158.631488] mount_fs+0x66/0x2d0 [ 158.634859] vfs_kern_mount.part.26+0xc6/0x4a0 [ 158.639437] ? may_umount+0xa0/0xa0 [ 158.643059] ? _raw_read_unlock+0x22/0x30 [ 158.647203] ? __get_fs_type+0x8a/0xc0 [ 158.651093] do_mount+0xea4/0x2bb0 [ 158.654638] ? copy_mount_string+0x40/0x40 [ 158.658870] ? rcu_pm_notify+0xc0/0xc0 [ 158.662753] ? copy_mount_options+0x5f/0x2e0 [ 158.667155] ? rcu_read_lock_sched_held+0x108/0x120 [ 158.672171] ? kmem_cache_alloc_trace+0x459/0x740 [ 158.677010] ? kasan_check_write+0x14/0x20 [ 158.681242] ? _copy_from_user+0x99/0x110 [ 158.685389] ? copy_mount_options+0x1f7/0x2e0 [ 158.689886] SyS_mount+0xab/0x120 [ 158.693334] ? copy_mnt_ns+0xb30/0xb30 [ 158.697217] do_syscall_64+0x281/0x940 [ 158.701099] ? vmalloc_sync_all+0x30/0x30 [ 158.705239] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 158.710765] ? syscall_return_slowpath+0x550/0x550 [ 158.715685] ? syscall_return_slowpath+0x2ac/0x550 [ 158.720608] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 158.725964] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 158.730807] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 158.735988] RIP: 0033:0x454e79 [ 158.739171] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 158.746883] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 158.754151] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 158.761418] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 158.768674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 158.775924] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b [ 158.904779] autofs4:pid:10467:autofs4_fill_super: called with bogus options [ 158.946987] autofs4:pid:10487:autofs4_fill_super: called with bogus options 2018/03/30 19:41:25 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:25 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:25 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:25 executing program 5 (fault-call:18 fault-nth:28): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:25 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:25 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 2018/03/30 19:41:25 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:25 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) [ 159.798487] autofs4:pid:10515:autofs4_fill_super: called with bogus options [ 159.802830] FAULT_INJECTION: forcing a failure. [ 159.802830] name failslab, interval 1, probability 0, space 0, times 0 [ 159.817096] CPU: 0 PID: 10507 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 159.824364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.833715] Call Trace: [ 159.836325] dump_stack+0x194/0x24d [ 159.839959] ? arch_local_irq_restore+0x53/0x53 [ 159.844653] should_fail+0x8c0/0xa40 [ 159.848373] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 159.853483] ? kasan_kmalloc+0xad/0xe0 [ 159.857380] ? kmem_cache_alloc_trace+0x136/0x740 [ 159.862222] ? __memcg_init_list_lru_node+0x169/0x270 [ 159.867417] ? sget_userns+0x6b1/0xe40 [ 159.871306] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 159.876055] ? do_mount+0xea4/0x2bb0 [ 159.879773] ? SyS_mount+0xab/0x120 [ 159.883406] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 159.888765] ? find_held_lock+0x35/0x1d0 [ 159.892844] ? __lock_is_held+0xb6/0x140 [ 159.896927] ? check_same_owner+0x320/0x320 [ 159.901241] ? rcu_note_context_switch+0x710/0x710 [ 159.906182] should_failslab+0xec/0x120 [ 159.910159] kmem_cache_alloc_trace+0x4b/0x740 [ 159.914743] ? __kmalloc_node+0x33/0x70 [ 159.918715] ? __kmalloc_node+0x33/0x70 [ 159.922689] ? rcu_read_lock_sched_held+0x108/0x120 [ 159.927706] __memcg_init_list_lru_node+0x169/0x270 [ 159.932715] ? list_lru_add+0x7c0/0x7c0 [ 159.936677] ? __kmalloc_node+0x47/0x70 [ 159.940643] __list_lru_init+0x544/0x750 [ 159.944695] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 159.950566] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 159.955578] ? lockdep_init_map+0x9/0x10 [ 159.959647] sget_userns+0x6b1/0xe40 [ 159.963359] ? kernfs_sop_show_path+0x190/0x190 [ 159.968025] ? kernfs_sop_show_options+0x180/0x180 [ 159.972973] ? destroy_unused_super.part.6+0xd0/0xd0 [ 159.978135] ? check_same_owner+0x320/0x320 [ 159.982458] ? rcu_pm_notify+0xc0/0xc0 [ 159.986346] ? rcu_read_lock_sched_held+0x108/0x120 [ 159.991351] ? kmem_cache_alloc_trace+0x459/0x740 [ 159.996191] ? lock_downgrade+0x980/0x980 [ 160.000339] kernfs_mount_ns+0x13d/0x8b0 [ 160.004404] ? kernfs_super_ns+0x70/0x70 [ 160.008475] sysfs_mount+0xc2/0x1c0 [ 160.012104] ? sysfs_kill_sb+0x40/0x40 [ 160.015991] ? alloc_pages_current+0xbe/0x1e0 [ 160.020482] ? security_sb_copy_data+0x81/0xb0 [ 160.025081] mount_fs+0x66/0x2d0 [ 160.028459] vfs_kern_mount.part.26+0xc6/0x4a0 [ 160.033047] ? may_umount+0xa0/0xa0 [ 160.036678] ? _raw_read_unlock+0x22/0x30 [ 160.040828] ? __get_fs_type+0x8a/0xc0 [ 160.044722] do_mount+0xea4/0x2bb0 [ 160.048278] ? copy_mount_string+0x40/0x40 [ 160.052500] ? rcu_pm_notify+0xc0/0xc0 [ 160.056402] ? copy_mount_options+0x5f/0x2e0 [ 160.060819] ? rcu_read_lock_sched_held+0x108/0x120 [ 160.065831] ? kmem_cache_alloc_trace+0x459/0x740 [ 160.070674] ? kasan_check_write+0x14/0x20 [ 160.074903] ? _copy_from_user+0x99/0x110 [ 160.079049] ? copy_mount_options+0x1f7/0x2e0 [ 160.083538] SyS_mount+0xab/0x120 [ 160.086975] ? copy_mnt_ns+0xb30/0xb30 [ 160.090850] do_syscall_64+0x281/0x940 [ 160.094722] ? vmalloc_sync_all+0x30/0x30 [ 160.098855] ? _raw_spin_unlock_irq+0x27/0x70 [ 160.103336] ? finish_task_switch+0x1c1/0x7e0 [ 160.107819] ? syscall_return_slowpath+0x550/0x550 [ 160.112751] ? syscall_return_slowpath+0x2ac/0x550 [ 160.117672] ? prepare_exit_to_usermode+0x350/0x350 [ 160.122701] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 160.128081] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 160.132933] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 160.138118] RIP: 0033:0x454e79 [ 160.141304] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 160.149009] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 160.156278] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 160.163542] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 160.170804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 160.178074] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c [ 160.193223] autofs4:pid:10518:autofs4_fill_super: called with bogus options 2018/03/30 19:41:26 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) socketpair$inet6(0xa, 0x80000, 0x7, &(0x7f0000000180)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x13, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) 2018/03/30 19:41:26 executing program 5 (fault-call:18 fault-nth:29): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:26 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 160.470761] autofs4:pid:10531:autofs4_fill_super: called with bogus options [ 160.492218] FAULT_INJECTION: forcing a failure. [ 160.492218] name failslab, interval 1, probability 0, space 0, times 0 [ 160.503700] CPU: 0 PID: 10532 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 160.510973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.520330] Call Trace: [ 160.522937] dump_stack+0x194/0x24d [ 160.526572] ? arch_local_irq_restore+0x53/0x53 [ 160.531270] should_fail+0x8c0/0xa40 [ 160.535005] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 160.540122] ? kasan_kmalloc+0xad/0xe0 [ 160.544008] ? kmem_cache_alloc_trace+0x136/0x740 [ 160.548856] ? __memcg_init_list_lru_node+0x169/0x270 [ 160.554051] ? sget_userns+0x6b1/0xe40 [ 160.557954] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 160.562712] ? do_mount+0xea4/0x2bb0 [ 160.566417] ? SyS_mount+0xab/0x120 [ 160.570060] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 160.575451] ? find_held_lock+0x35/0x1d0 [ 160.579537] ? __lock_is_held+0xb6/0x140 [ 160.583646] ? check_same_owner+0x320/0x320 [ 160.587987] ? rcu_note_context_switch+0x710/0x710 [ 160.592933] should_failslab+0xec/0x120 [ 160.596916] kmem_cache_alloc_trace+0x4b/0x740 [ 160.601501] ? __kmalloc_node+0x33/0x70 [ 160.605473] ? __kmalloc_node+0x33/0x70 [ 160.609449] ? rcu_read_lock_sched_held+0x108/0x120 [ 160.614484] __memcg_init_list_lru_node+0x169/0x270 [ 160.619506] ? list_lru_add+0x7c0/0x7c0 [ 160.623483] ? __kmalloc_node+0x47/0x70 [ 160.627467] __list_lru_init+0x544/0x750 [ 160.631530] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 160.637406] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 160.642435] ? lockdep_init_map+0x9/0x10 [ 160.646506] sget_userns+0x6b1/0xe40 [ 160.650220] ? kernfs_sop_show_path+0x190/0x190 [ 160.654889] ? kernfs_sop_show_options+0x180/0x180 [ 160.659808] ? destroy_unused_super.part.6+0xd0/0xd0 [ 160.664913] ? check_same_owner+0x320/0x320 [ 160.669222] ? rcu_pm_notify+0xc0/0xc0 [ 160.673131] ? rcu_read_lock_sched_held+0x108/0x120 [ 160.678143] ? kmem_cache_alloc_trace+0x459/0x740 [ 160.682985] ? lock_downgrade+0x980/0x980 [ 160.687164] kernfs_mount_ns+0x13d/0x8b0 [ 160.691242] ? kernfs_super_ns+0x70/0x70 [ 160.695332] sysfs_mount+0xc2/0x1c0 [ 160.698969] ? sysfs_kill_sb+0x40/0x40 [ 160.702869] ? alloc_pages_current+0xbe/0x1e0 [ 160.707381] ? security_sb_copy_data+0x81/0xb0 [ 160.711980] mount_fs+0x66/0x2d0 [ 160.715365] vfs_kern_mount.part.26+0xc6/0x4a0 2018/03/30 19:41:26 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:26 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) [ 160.719957] ? may_umount+0xa0/0xa0 [ 160.723590] ? _raw_read_unlock+0x22/0x30 [ 160.727739] ? __get_fs_type+0x8a/0xc0 [ 160.731642] do_mount+0xea4/0x2bb0 [ 160.735206] ? copy_mount_string+0x40/0x40 [ 160.739449] ? rcu_pm_notify+0xc0/0xc0 [ 160.743345] ? copy_mount_options+0x5f/0x2e0 [ 160.747737] ? rcu_read_lock_sched_held+0x108/0x120 [ 160.752739] ? kmem_cache_alloc_trace+0x459/0x740 [ 160.757571] ? kasan_check_write+0x14/0x20 [ 160.761792] ? _copy_from_user+0x99/0x110 [ 160.765929] ? copy_mount_options+0x1f7/0x2e0 [ 160.770412] SyS_mount+0xab/0x120 [ 160.773847] ? copy_mnt_ns+0xb30/0xb30 [ 160.777722] do_syscall_64+0x281/0x940 [ 160.781594] ? vmalloc_sync_all+0x30/0x30 [ 160.785734] ? _raw_spin_unlock_irq+0x27/0x70 [ 160.790231] ? finish_task_switch+0x1c1/0x7e0 [ 160.794713] ? syscall_return_slowpath+0x550/0x550 [ 160.799633] ? syscall_return_slowpath+0x2ac/0x550 [ 160.804572] ? prepare_exit_to_usermode+0x350/0x350 [ 160.809599] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 160.814962] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/30 19:41:26 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) [ 160.819795] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 160.824970] RIP: 0033:0x454e79 [ 160.828153] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 160.835861] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 160.843124] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 160.850396] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 160.857660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 160.864926] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d 2018/03/30 19:41:26 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:26 executing program 5 (fault-call:18 fault-nth:30): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:26 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') [ 160.940491] autofs4:pid:10542:autofs4_fill_super: called with bogus options [ 161.215499] FAULT_INJECTION: forcing a failure. [ 161.215499] name failslab, interval 1, probability 0, space 0, times 0 [ 161.226836] CPU: 1 PID: 10566 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 161.234105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.243446] Call Trace: [ 161.246017] dump_stack+0x194/0x24d [ 161.249644] ? arch_local_irq_restore+0x53/0x53 [ 161.254302] ? __save_stack_trace+0x7e/0xd0 [ 161.258618] should_fail+0x8c0/0xa40 [ 161.262318] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 161.267408] ? kasan_kmalloc+0xad/0xe0 [ 161.271295] ? kmem_cache_alloc_trace+0x136/0x740 [ 161.276132] ? __memcg_init_list_lru_node+0x169/0x270 [ 161.281320] ? __list_lru_init+0x544/0x750 [ 161.285543] ? sget_userns+0x6b1/0xe40 [ 161.289413] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 161.294162] ? do_mount+0xea4/0x2bb0 [ 161.297871] ? SyS_mount+0xab/0x120 [ 161.301498] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 161.306876] ? find_held_lock+0x35/0x1d0 [ 161.310942] ? __lock_is_held+0xb6/0x140 [ 161.315015] ? check_same_owner+0x320/0x320 [ 161.319331] ? rcu_note_context_switch+0x710/0x710 [ 161.324254] should_failslab+0xec/0x120 [ 161.328214] kmem_cache_alloc_trace+0x4b/0x740 [ 161.332787] ? __kmalloc_node+0x33/0x70 [ 161.336747] ? __kmalloc_node+0x33/0x70 [ 161.340865] ? rcu_read_lock_sched_held+0x108/0x120 [ 161.345881] __memcg_init_list_lru_node+0x169/0x270 [ 161.350898] ? list_lru_add+0x7c0/0x7c0 [ 161.354858] ? __kmalloc_node+0x47/0x70 [ 161.358815] __list_lru_init+0x544/0x750 [ 161.362867] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 161.368749] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 161.373752] ? lockdep_init_map+0x9/0x10 [ 161.378321] sget_userns+0x6b1/0xe40 [ 161.382029] ? kernfs_sop_show_path+0x190/0x190 [ 161.386683] ? kernfs_sop_show_options+0x180/0x180 [ 161.391601] ? destroy_unused_super.part.6+0xd0/0xd0 [ 161.396687] ? check_same_owner+0x320/0x320 [ 161.400991] ? rcu_pm_notify+0xc0/0xc0 [ 161.404866] ? rcu_read_lock_sched_held+0x108/0x120 [ 161.409864] ? kmem_cache_alloc_trace+0x459/0x740 [ 161.414692] ? lock_downgrade+0x980/0x980 [ 161.418823] kernfs_mount_ns+0x13d/0x8b0 [ 161.422871] ? kernfs_super_ns+0x70/0x70 [ 161.426921] sysfs_mount+0xc2/0x1c0 [ 161.430533] ? sysfs_kill_sb+0x40/0x40 [ 161.434404] ? alloc_pages_current+0xbe/0x1e0 [ 161.438885] ? security_sb_copy_data+0x81/0xb0 [ 161.443452] mount_fs+0x66/0x2d0 [ 161.446815] vfs_kern_mount.part.26+0xc6/0x4a0 [ 161.451380] ? may_umount+0xa0/0xa0 [ 161.454994] ? _raw_read_unlock+0x22/0x30 [ 161.459131] ? __get_fs_type+0x8a/0xc0 [ 161.463006] do_mount+0xea4/0x2bb0 [ 161.466539] ? copy_mount_string+0x40/0x40 [ 161.470763] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 161.475771] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 161.480530] ? retint_kernel+0x10/0x10 [ 161.484413] ? copy_mount_options+0x18b/0x2e0 [ 161.488894] ? copy_mount_options+0x196/0x2e0 [ 161.493364] ? copy_mount_options+0x1f7/0x2e0 [ 161.497836] SyS_mount+0xab/0x120 [ 161.501274] ? copy_mnt_ns+0xb30/0xb30 [ 161.505153] do_syscall_64+0x281/0x940 [ 161.509029] ? vmalloc_sync_all+0x30/0x30 [ 161.513159] ? _raw_spin_unlock_irq+0x27/0x70 [ 161.517635] ? finish_task_switch+0x1c1/0x7e0 [ 161.522105] ? syscall_return_slowpath+0x550/0x550 [ 161.527031] ? syscall_return_slowpath+0x2ac/0x550 [ 161.531944] ? prepare_exit_to_usermode+0x350/0x350 [ 161.536936] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 161.542286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 161.547125] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 161.552298] RIP: 0033:0x454e79 [ 161.555461] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 161.563150] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 161.570406] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 161.577674] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 161.584919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 161.592167] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e 2018/03/30 19:41:27 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:27 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:27 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:27 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:27 executing program 1: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r8}, 0x48) 2018/03/30 19:41:27 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:27 executing program 5 (fault-call:18 fault-nth:31): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:27 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) socketpair(0x12, 0x80000, 0x100020000000, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r2, &(0x7f00000020c0)={&(0x7f0000000bc0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000000c40)=""/27, 0x1b}, {&(0x7f0000000c80)=""/104, 0x68}, {&(0x7f0000000d00)=""/218, 0xda}, {&(0x7f0000000e00)=""/4096, 0x1000}, {&(0x7f0000001e00)=""/147, 0x93}, {&(0x7f0000001ec0)=""/95, 0x5f}, {&(0x7f0000001f40)=""/32, 0x20}], 0x7, &(0x7f0000002000)=""/138, 0x8a, 0x800}, 0x10101) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 162.108135] autofs4:pid:10584:autofs4_fill_super: called with bogus options [ 162.131592] FAULT_INJECTION: forcing a failure. [ 162.131592] name failslab, interval 1, probability 0, space 0, times 0 [ 162.142945] CPU: 1 PID: 10585 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 2018/03/30 19:41:28 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') [ 162.150221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.159571] Call Trace: [ 162.162161] dump_stack+0x194/0x24d [ 162.165798] ? arch_local_irq_restore+0x53/0x53 [ 162.170474] ? __save_stack_trace+0x7e/0xd0 [ 162.174820] should_fail+0x8c0/0xa40 [ 162.178533] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 162.183625] ? kasan_kmalloc+0xad/0xe0 [ 162.187508] ? kmem_cache_alloc_trace+0x136/0x740 [ 162.192342] ? __memcg_init_list_lru_node+0x169/0x270 [ 162.197521] ? __list_lru_init+0x544/0x750 [ 162.201755] ? sget_userns+0x6b1/0xe40 [ 162.205647] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 162.210186] autofs4:pid:10593:autofs4_fill_super: called with bogus options [ 162.210393] ? do_mount+0xea4/0x2bb0 [ 162.221179] ? SyS_mount+0xab/0x120 [ 162.224810] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 162.230178] ? find_held_lock+0x35/0x1d0 [ 162.235057] ? __lock_is_held+0xb6/0x140 [ 162.239135] ? check_same_owner+0x320/0x320 [ 162.243463] ? rcu_note_context_switch+0x710/0x710 [ 162.248410] should_failslab+0xec/0x120 [ 162.252392] kmem_cache_alloc_trace+0x4b/0x740 [ 162.256975] ? __kmalloc_node+0x33/0x70 [ 162.260941] ? __kmalloc_node+0x33/0x70 [ 162.264909] ? rcu_read_lock_sched_held+0x108/0x120 [ 162.269926] __memcg_init_list_lru_node+0x169/0x270 [ 162.274934] ? list_lru_add+0x7c0/0x7c0 [ 162.278888] ? __kmalloc_node+0x47/0x70 [ 162.282842] __list_lru_init+0x544/0x750 [ 162.286884] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 162.292748] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 162.297744] ? lockdep_init_map+0x9/0x10 [ 162.301782] sget_userns+0x6b1/0xe40 [ 162.305470] ? kernfs_sop_show_path+0x190/0x190 [ 162.310121] ? kernfs_sop_show_options+0x180/0x180 [ 162.315030] ? destroy_unused_super.part.6+0xd0/0xd0 [ 162.320115] ? check_same_owner+0x320/0x320 [ 162.324411] ? rcu_pm_notify+0xc0/0xc0 [ 162.328281] ? rcu_read_lock_sched_held+0x108/0x120 [ 162.333274] ? kmem_cache_alloc_trace+0x459/0x740 [ 162.338090] ? lock_downgrade+0x980/0x980 [ 162.342218] kernfs_mount_ns+0x13d/0x8b0 [ 162.346258] ? kernfs_super_ns+0x70/0x70 [ 162.350301] sysfs_mount+0xc2/0x1c0 [ 162.353904] ? sysfs_kill_sb+0x40/0x40 [ 162.357772] ? alloc_pages_current+0xbe/0x1e0 [ 162.362246] ? security_sb_copy_data+0x81/0xb0 [ 162.366807] mount_fs+0x66/0x2d0 [ 162.370155] vfs_kern_mount.part.26+0xc6/0x4a0 [ 162.374713] ? may_umount+0xa0/0xa0 [ 162.378317] ? _raw_read_unlock+0x22/0x30 [ 162.382440] ? __get_fs_type+0x8a/0xc0 [ 162.386306] do_mount+0xea4/0x2bb0 [ 162.389824] ? copy_mount_string+0x40/0x40 [ 162.394036] ? rcu_pm_notify+0xc0/0xc0 [ 162.397903] ? copy_mount_options+0x5f/0x2e0 [ 162.402286] ? rcu_read_lock_sched_held+0x108/0x120 [ 162.407364] ? kmem_cache_alloc_trace+0x459/0x740 [ 162.412183] ? kasan_check_write+0x14/0x20 [ 162.416394] ? _copy_from_user+0x99/0x110 [ 162.420518] ? copy_mount_options+0x1f7/0x2e0 [ 162.424989] SyS_mount+0xab/0x120 [ 162.428417] ? copy_mnt_ns+0xb30/0xb30 [ 162.432280] do_syscall_64+0x281/0x940 [ 162.436144] ? vmalloc_sync_all+0x30/0x30 [ 162.440265] ? _raw_spin_unlock_irq+0x27/0x70 [ 162.444736] ? finish_task_switch+0x1c1/0x7e0 [ 162.449204] ? syscall_return_slowpath+0x550/0x550 [ 162.454108] ? syscall_return_slowpath+0x2ac/0x550 [ 162.459016] ? prepare_exit_to_usermode+0x350/0x350 [ 162.464015] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 162.469361] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 162.474181] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 162.479344] RIP: 0033:0x454e79 [ 162.482511] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 162.490194] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 162.497442] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 2018/03/30 19:41:28 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) sendmsg(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2, 0x4, {0xa, 0x4e22, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x2}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f00000007c0)=ANY=[], 0x309}, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='%\x00') recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 162.504687] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 162.511933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 162.519176] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001f 2018/03/30 19:41:28 executing program 5 (fault-call:18 fault-nth:32): r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000540)=r3, 0xfffffffffffffd91) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500)=r4, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(r6, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r5, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:28 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) socketpair$ax25(0x3, 0x5, 0xd93680ddde3702d, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000500), 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet6(0xa, 0x80000, 0xffd6, &(0x7f0000001740)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file1\x00', &(0x7f0000000340)='exofs\x00', 0x0, &(0x7f0000000380)="1e989935bbbd131bcb5a486cac737e6b3e1efab60483fb35846ce102d05ee9b3294e9e1a130ae2f1c5b9a5c9ff8a3caee4053316901611a48880d466f8b12d82a53ec81b9449c1") recvmsg(0xffffffffffffffff, &(0x7f0000001a40)={&(0x7f0000001780)=@can, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/87, 0x57}, {&(0x7f0000001880)=""/9, 0x9}, {&(0x7f00000018c0)=""/158, 0x9e}], 0x3, &(0x7f00000019c0)=""/105, 0x69}, 0x40010040) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x0, 0x0, 0x101, 0x4, r3, 0x3f}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/30 19:41:28 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x0, &(0x7f0000000240)) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000980)={0xffffffffffffffff}) socketpair(0x5, 0x80b, 0x7f, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@generic, 0x80, &(0x7f0000000700)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000000440)=""/29, 0x1d}, {&(0x7f0000000480)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/12, 0xc}], 0x6, &(0x7f00000007c0)=""/222, 0xde, 0x8}, 0x20) [ 162.774673] autofs4:pid:10618:autofs4_fill_super: called with bogus options [ 162.790578] autofs4:pid:10621:autofs4_fill_super: called with bogus options [ 162.810579] FAULT_INJECTION: forcing a failure. [ 162.810579] name failslab, interval 1, probability 0, space 0, times 0 [ 162.822175] CPU: 0 PID: 10619 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 162.829447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.838796] Call Trace: [ 162.841388] dump_stack+0x194/0x24d [ 162.845032] ? arch_local_irq_restore+0x53/0x53 [ 162.849725] should_fail+0x8c0/0xa40 [ 162.853443] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 162.858584] ? find_held_lock+0x35/0x1d0 [ 162.862665] ? __lock_is_held+0xb6/0x140 [ 162.866743] ? check_same_owner+0x320/0x320 [ 162.871064] ? rcu_note_context_switch+0x710/0x710 [ 162.875983] ? find_held_lock+0x35/0x1d0 [ 162.880063] should_failslab+0xec/0x120 [ 162.884053] __kmalloc+0x63/0x760 [ 162.887507] ? lock_downgrade+0x980/0x980 [ 162.891658] ? _raw_spin_unlock+0x22/0x30 [ 162.895808] ? register_shrinker+0x10e/0x2d0 [ 162.900219] ? trace_event_raw_event_module_request+0x320/0x320 [ 162.906281] register_shrinker+0x10e/0x2d0 [ 162.910505] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 162.916297] ? memcpy+0x45/0x50 [ 162.919571] sget_userns+0xbbf/0xe40 [ 162.923280] ? kernfs_sop_show_path+0x190/0x190 [ 162.927977] ? kernfs_sop_show_options+0x180/0x180 [ 162.932913] ? destroy_unused_super.part.6+0xd0/0xd0 [ 162.938025] ? check_same_owner+0x320/0x320 [ 162.942351] ? rcu_pm_notify+0xc0/0xc0 [ 162.946258] ? rcu_read_lock_sched_held+0x108/0x120 [ 162.951268] ? kmem_cache_alloc_trace+0x459/0x740 [ 162.956122] ? lock_downgrade+0x980/0x980 [ 162.960271] kernfs_mount_ns+0x13d/0x8b0 [ 162.964339] ? kernfs_super_ns+0x70/0x70 [ 162.968431] sysfs_mount+0xc2/0x1c0 [ 162.972069] ? sysfs_kill_sb+0x40/0x40 [ 162.975975] ? alloc_pages_current+0xbe/0x1e0 [ 162.980486] ? security_sb_copy_data+0x81/0xb0 [ 162.985086] mount_fs+0x66/0x2d0 [ 162.988468] vfs_kern_mount.part.26+0xc6/0x4a0 [ 162.993066] ? may_umount+0xa0/0xa0 [ 162.996697] ? _raw_read_unlock+0x22/0x30 [ 163.000830] ? __get_fs_type+0x8a/0xc0 [ 163.004707] do_mount+0xea4/0x2bb0 [ 163.008244] ? copy_mount_string+0x40/0x40 [ 163.012464] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 163.017468] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 163.022239] ? retint_kernel+0x10/0x10 [ 163.026125] ? copy_mount_options+0x149/0x2e0 [ 163.030626] ? copy_mount_options+0x14c/0x2e0 [ 163.035122] ? copy_mount_options+0x1f7/0x2e0 [ 163.039608] SyS_mount+0xab/0x120 [ 163.043054] ? copy_mnt_ns+0xb30/0xb30 [ 163.046939] do_syscall_64+0x281/0x940 [ 163.050817] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 163.056338] ? syscall_return_slowpath+0x550/0x550 [ 163.061255] ? syscall_return_slowpath+0x2ac/0x550 [ 163.066192] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 163.071576] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 163.076443] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 163.081627] RIP: 0033:0x454e79 [ 163.084807] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 163.092528] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 163.099794] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 163.107054] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 163.114318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 163.121576] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000020 [ 163.129650] kasan: CONFIG_KASAN_INLINE enabled [ 163.134667] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 163.142079] general protection fault: 0000 [#1] SMP KASAN [ 163.147597] Dumping ftrace buffer: [ 163.151109] (ftrace buffer empty) [ 163.154797] Modules linked in: [ 163.157983] CPU: 1 PID: 10619 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #42 [ 163.165236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 2018/03/30 19:41:29 executing program 7: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) [ 163.174576] RIP: 0010:__list_del_entry_valid+0x7e/0x150 [ 163.179917] RSP: 0018:ffff88019e6cf658 EFLAGS: 00010246 [ 163.185259] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 163.192510] RDX: 0000000000000000 RSI: ffff8801b86d9418 RDI: ffff8801b86d9420 [ 163.199766] RBP: ffff88019e6cf670 R08: ffffffff81d39132 R09: 0000000000000004 [ 163.207024] R10: ffff88019e6cf670 R11: 0000000000000000 R12: 0000000000000000 [ 163.214272] R13: ffff880197684ac0 R14: ffff88019e6cf700 R15: ffff8801b86d9418 2018/03/30 19:41:29 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) 2018/03/30 19:41:29 executing program 3: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x0, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x10001, 0x9, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8000, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000c00)='nfs\x00', 0x0, &(0x7f0000000c40)="a381e0e2608032534d24f6083ce9ebfeb8182c66965bf2f11df66183ec38b4d4b75ab0f6f26c1592f9ab94397f5e4c17aa9630f52aa899e66b6e5e17bbe0937a30c5665bc7f85de50750755a75ac9d2bc3a2a8372c744c2cba474bb3e3bbb08136ef2437695e1e96fd8bf9a7dc71090000001311685e8b0bff2ffb7788ad3402bea20b9f8171df1e337a26") close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x4000000000000003, 0x1, 0x174f1f0f, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000400)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) recvmsg(r6, &(0x7f0000000b40)={&(0x7f0000000800)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/146, 0x92}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/61, 0x3d}, {&(0x7f0000000a00)=""/52, 0x34}, {&(0x7f0000000a40)=""/23, 0x17}], 0x5, &(0x7f0000000b00)=""/24, 0x18}, 0x142) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r8, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) recvmsg(r8, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf297a00f8ffffff000000000000000085b600faa7f2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r7}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) [ 163.221522] FS: 00007fd74de6f700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 163.229732] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.235600] CR2: 0000001b9bc26000 CR3: 00000001ac22a006 CR4: 00000000001606e0 [ 163.242859] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 163.250119] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 163.257375] Call Trace: [ 163.259955] ? mutex_lock_nested+0x16/0x20 [ 163.264173] kernfs_kill_sb+0x9e/0x330 [ 163.268043] ? unregister_shrinker+0x22c/0x3a0 [ 163.272617] ? kernfs_mount_ns+0x8b0/0x8b0 [ 163.276845] ? perf_trace_mm_vmscan_writepage+0x790/0x790 [ 163.282370] ? register_shrinker+0x235/0x2d0 [ 163.286752] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 163.292527] sysfs_kill_sb+0x22/0x40 [ 163.296215] deactivate_locked_super+0x88/0xd0 [ 163.300768] sget_userns+0xbda/0xe40 [ 163.304454] ? kernfs_sop_show_path+0x190/0x190 [ 163.309099] ? kernfs_sop_show_options+0x180/0x180 [ 163.314004] ? destroy_unused_super.part.6+0xd0/0xd0 [ 163.319088] ? check_same_owner+0x320/0x320 [ 163.323384] ? rcu_pm_notify+0xc0/0xc0 [ 163.327248] ? rcu_read_lock_sched_held+0x108/0x120 [ 163.332238] ? kmem_cache_alloc_trace+0x459/0x740 [ 163.337054] ? lock_downgrade+0x980/0x980 [ 163.341180] kernfs_mount_ns+0x13d/0x8b0 [ 163.345213] ? kernfs_super_ns+0x70/0x70 [ 163.349250] sysfs_mount+0xc2/0x1c0 [ 163.352851] ? sysfs_kill_sb+0x40/0x40 [ 163.356710] ? alloc_pages_current+0xbe/0x1e0 [ 163.361182] ? security_sb_copy_data+0x81/0xb0 [ 163.365738] mount_fs+0x66/0x2d0 [ 163.369082] vfs_kern_mount.part.26+0xc6/0x4a0 [ 163.373637] ? may_umount+0xa0/0xa0 [ 163.377237] ? _raw_read_unlock+0x22/0x30 [ 163.381359] ? __get_fs_type+0x8a/0xc0 [ 163.385221] do_mount+0xea4/0x2bb0 [ 163.388736] ? copy_mount_string+0x40/0x40 [ 163.392947] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 163.397936] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 163.402673] ? retint_kernel+0x10/0x10 [ 163.406536] ? copy_mount_options+0x149/0x2e0 [ 163.411004] ? copy_mount_options+0x14c/0x2e0 [ 163.415475] ? copy_mount_options+0x1f7/0x2e0 [ 163.420292] SyS_mount+0xab/0x120 [ 163.423716] ? copy_mnt_ns+0xb30/0xb30 [ 163.427580] do_syscall_64+0x281/0x940 [ 163.431445] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 163.436957] ? syscall_return_slowpath+0x550/0x550 [ 163.441859] ? syscall_return_slowpath+0x2ac/0x550 [ 163.446762] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 163.452099] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 163.456926] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 163.462092] RIP: 0033:0x454e79 [ 163.465257] RSP: 002b:00007fd74de6ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 163.472941] RAX: ffffffffffffffda RBX: 00007fd74de6f6d4 RCX: 0000000000454e79 [ 163.480182] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000100 [ 163.487425] RBP: 000000000072bea0 R08: 0000000020000040 R09: 0000000000000000 [ 163.494673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 163.501915] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000020 [ 163.509165] Code: 00 00 00 00 ad de 49 39 c4 74 66 48 b8 00 02 00 00 00 00 ad de 48 89 da 48 39 c3 74 65 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 75 7b 48 8b 13 48 39 f2 75 57 49 8d 7c 24 08 48 b8 [ 163.528321] RIP: __list_del_entry_valid+0x7e/0x150 RSP: ffff88019e6cf658 [ 163.535308] ---[ end trace 35ad08c5e9ea86d3 ]--- [ 163.540081] Kernel panic - not syncing: Fatal exception [ 163.545862] Dumping ftrace buffer: [ 163.549374] (ftrace buffer empty) [ 163.553056] Kernel Offset: disabled [ 163.556654] Rebooting in 86400 seconds..