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", &(0x7f0000001180)="82b046a96e5f23ea0c40c87bee4f8bbf032a88e6bd3ce01437297fbeba957c6e6a0162713db55faceba819fed09ccfb1e50231b3c1bb6a7aaa84b798cb371f3bcc3b3c98b01e677adc6343d863581a3bc49ec17848c66343134f30439f4ca039baae"}, 0x20) 2018/03/30 22:45:24 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x0, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2641.356459] devpts: called with bogus options 2018/03/30 22:45:24 executing program 4: r0 = getpid() perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x7, 0x0, 0x65, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000800)=""/63, 0x3f}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000140)=ANY=[@ANYBLOB="09000000000000000000000000000000000000009045107900000000000000000000000000000000008d4d1e"]) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0xffffffff) [ 2641.416555] devpts: called with bogus options 2018/03/30 22:45:24 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:24 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc377) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x6) r3 = gettid() r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002680)={&(0x7f00000012c0)='./file1\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000002740)={0x0, r4, 0x6, 0x1}, 0x14) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) socketpair(0x10, 0x800, 0x5, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = perf_event_open(&(0x7f0000001340)={0x7, 0x70, 0xfffffffffffffff9, 0x9, 0x5, 0xff, 0x0, 0x7fff, 0x0, 0x1, 0x3, 0x6, 0x457, 0x3, 0x5, 0x3, 0x9, 0xb0, 0x40, 0x1, 0x1dc, 0x2, 0x0, 0x8001, 0x1, 0x0, 0x6, 0x4, 0x0, 0xff, 0x9, 0x7fff, 0x100000000, 0x8, 0x7, 0x6ad, 0xffffffffffffff14, 0x0, 0x0, 0x39, 0x4, @perf_config_ext={0x6, 0x80000000}, 0x400, 0xfffffffffffffff8, 0xffffffffffffff81, 0x3, 0x2, 0x6, 0xb75}, r3, 0x7, r5, 0x8) sendmsg(r6, &(0x7f0000002900)={&(0x7f0000001140)=@in6={0xa, 0x4e22, 0x800, @local={0xfe, 0x80, [], 0xaa}, 0x3}, 0x80, &(0x7f0000002640)=[{&(0x7f00000011c0)="8fe83e711a42beabc86af1612614f273c26dcca327b0e5bebc8763c4ede9e25930fb7ecf170627c79e22299ea1172be427d64a02b89b450b933a451ee719b8bf2b2d5a5c4e489084a2a67a240112c53f1e809016eb21d17896d5048bf6873e493da4758147c1b3183a95d46d8efda7ee46250e3cd5810d3ab9addf454829b6940462dff8e36ada976889f69e7be465060b5854031d30b97abf5be15d57bf5b3ea596978aa4de18c5f9f9b9119151f82c2aa14d6bb55da83e7b89b71f26474c6b01d5a46c80d875768f8b91bfd8b1", 0xce}, {&(0x7f0000002980)="a7cb4f68922933988c9a709aaea6869b7a28b3515847f32a3eee27b6a48cd40169fbdf845128a3e9e734a9593d9bc9b64f600b181e987da3397cae93cb94c0882bc612b1a5a3caddd3e1883753b6e57fce4289d1f9e7e0fa730d15341856f86d1ea081afa140fe4973185f15803453213a860c977e5f999a4e6a1eedd67fb2f448e0d7c29e3bc16016a4ace2006a5d53653e7642db5bdb187788d6b10b1c70eaaee0c2272223137b31a165b6cf5027cf2b78a437f8b5b10bba63ee411ffbdb71b3e95eb183", 0xc5}, {&(0x7f0000001300)="d1faccbdeb73305ca80e09e2c4c8a5a244ae8a247f6311f84a9eb3610fbcd745", 0x20}], 0x3, &(0x7f00000028c0)=[{0x40, 0x100, 0x6, "f0ddfa4ee41a4a9965b0b7769a69b9f4239037d3aa98b2b3bed30a4b2e3acd1a9c91d0c999188aca17c053f8"}], 0x40, 0x40000}, 0x4000) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002700)='./file2\x00', 0x3) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='sysv\x00', 0x0, &(0x7f0000000100)="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") mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000a3bff8)='./file0\x00', &(0x7f00000026c0)='nfs4\x00', 0x0, &(0x7f000000a000)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x0, 0x0, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x7a52, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r3, 0x5, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002940)) recvmsg$kcm(r5, &(0x7f0000002600)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000013c0)=""/113, 0x71}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/15, 0xf}, {&(0x7f0000002480)=""/227, 0xe3}], 0x4, &(0x7f00000025c0)=""/61, 0x3d, 0x7fffffff}, 0x2001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002880)={0xffffffffffffffff, 0x50, &(0x7f0000002800)}, 0x10) 2018/03/30 22:45:24 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0xfffffffffffffffe) sendmsg(r2, &(0x7f0000000680)={&(0x7f00000002c0)=@sco={0x1f, {0x8, 0x80000000, 0x9, 0x6, 0xc54f, 0x7fe000000}}, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000340)=[{0xe8, 0x110, 0x3, "89b8606f7d2add3c1d868308d77dcdf2b737d3ce1eabd5c3f3ac7607997026cff12272080e606bbf31e57ffcaa51193ec1dd8b314d4451115ff60d1ebafd77d98ba2c8e0cf47e2368ff1536d33b40f45171533e8afca7e1098c8ef6916444fa8b7d4cf8fbb7a9624ec96b90dae455d277215feb9c00eeaba1d6fcb82f17bd496fdc32a164ed1e9bd4ff701d1bcf365a41b4e4abad89b45a7aef0a4df9086f38a4adcbf46c30fac02de0a0833e59fda358621eff858bade38aa6454d46e43e73bc94dc487f1a551acf2ae641d9fe30df1079f707c"}, {0x60, 0x11f, 0x101, "815e428144a1149f4511da1e1dc27867e1ad82eca05e44b88d5c3608cf9fb80625450a6d7be17f58fd45513332f159cfd05de6b5093f01a0bb6f9af0460c627f432ecc7585cbd9b8874561c4"}, {0x18, 0x6, 0x0, 'J'}, {0x88, 0x0, 0x80000001, "76486706103a573ace705435ba63e42cbf89f92be310265a447e53763c03d87e3b471dc08e512b246ec7c0cc76c6e0317d21bd96358a957c9ca6af5520b610534b8101d76d697755e97279eaf7bea7de44ad4b52dfe4be4d655fa33186fc2fe469ed40eac5037cea7bfb74198ab8a3b55811ae0f5e60f8"}, {0xd0, 0x10f, 0x0, "c37a4257e7fdb3070165c25156f63f75f1a8234d264673d56b8b6b303d8fd5d1e96c7e1466d34fa8a636bd591f78ddacf924cbe78c739b79ab652e1795a77721d0549a0fcf0edded07d0259979071fad177b560972904a61fc24754ac238ebae380941e3f00dc700d0a1ccc973b9f6b8b82155a92bbc3f1100924ee3f2616417e782083078da176aee382f087f5347723c6e2cf7ef1d56440e5728b5a4378ec268dc107c34ba8ef44cfbb627455bafae422ef394c728c152f360ea33d58526"}, {0x50, 0x107, 0xde4a, "876dfb6164aa780ff62867ee2f741441cbc7068915d49e9ebf1299cd937d75d71936c6adf401b63053db47cb9332cf43a9453339da45a8671c0c"}], 0x308, 0x800}, 0x800) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000740)={r5, &(0x7f00000006c0)="e23ad97a86dab6eb162b1a79975d23f4f6594333f0127da0e38889aed72e", &(0x7f0000000700)=""/26}, 0x18) r6 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000140)) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r6, 0x5, r3, 0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r7}, 0x10) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r8, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) [ 2641.508199] devpts: called with bogus options [ 2641.573590] devpts: called with bogus options 2018/03/30 22:45:25 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:25 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000630110000000000035000000000000009500070000000000"], &(0x7f0000002580)='GPL\x00', 0x1, 0xfb, &(0x7f0000000140)=""/251}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0xfffffffffffffffc, 0x8, 0x7d, 0x5, r0, 0x10000}, 0x2c) recvmsg(0xffffffffffffff9c, &(0x7f0000000ec0)={&(0x7f0000000a80)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000b00)=""/152, 0x98}, {&(0x7f0000000bc0)=""/78, 0x4e}, {&(0x7f0000000c40)=""/196, 0xc4}, {&(0x7f0000000d40)=""/116, 0x74}, {&(0x7f0000000dc0)=""/43, 0x2b}], 0x5, &(0x7f0000000e80), 0x0, 0x5}, 0x40000040) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xf, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="18d7ef0a4cb836c7dbd45883a49ade0000000400000cb9c7a6878d02fe7fa6"], &(0x7f0000000100)='GPL\x00', 0x8, 0xf2, &(0x7f0000000240)=""/242, 0x41f00, 0x1, [], r1}, 0x48) r2 = getpid() socketpair(0xa, 0x80005, 0x401, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xfffffffffffffff0, 0x6, 0x73b, 0x1ff, 0x0, 0x800000000, 0x20, 0x7, 0x4, 0x9, 0x31, 0x5, 0x3, 0x0, 0x9069, 0x1, 0x3, 0x9, 0x2, 0x27be, 0x4, 0x7, 0x7, 0x80000000, 0x8, 0xffffffffffff0001, 0x6, 0x101, 0x20, 0xe789, 0x0, 0x8, 0x6, 0x6, 0xd73, 0xd15f, 0x0, 0xfffffffffffff2f5, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x20000, 0x8, 0x1000, 0x0, 0x1, 0x7fff}, r2, 0x2, r3, 0xa) 2018/03/30 22:45:25 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x0, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:25 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001500)}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x20) socketpair$inet6(0xa, 0xf, 0x3, &(0x7f0000000080)) close(0xffffffffffffffff) 2018/03/30 22:45:25 executing program 1 (fault-call:19 fault-nth:59): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="180000001f0000000000000001000080750a180001000000e7ffffffffff1b0095000000000000002b2000013059dbf2804e69d6b25ef3872fc21aa9a71593754c9c1d5f0ff7c43c0ed01ca955ff69d8eb2eb2ce6a618d628ea214bd7007bfc2b0ff7a957edef5ece1d748cee9180bbfdd22bd9a652a9c4dee039fbf107597212c73c8f2b77ea3d4e0a48c9891f6f535d0f2706ec8743d652213e2767b68"], &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0xa, 0x8, &(0x7f0000000800)=@raw=[@jmp={0x5, 0x8, 0x8, 0x5, 0xf, 0xb0, 0x1}, @jmp={0x5, 0x8001, 0x0, 0xb, 0x2, 0xffffffff, 0xffffffffffffffff}, @generic={0xffffffffffff8001, 0x6, 0x4, 0xa9}, @alu={0x0, 0x4, 0xc, 0x0, 0x3, 0x50}], &(0x7f0000000840)='syzkaller\x00', 0x10000, 0x39, &(0x7f0000000880)=""/57, 0x40f00, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=ANY=[@ANYBLOB="81000000000000000000080000000000050000000000000000000000000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) r1 = perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x3, 0x740, 0xfffffffffffffffc, 0x830, 0x0, 0x7a86, 0x4040, 0x1, 0x1, 0x8, 0x0, 0xb60c, 0x0, 0x9d, 0xd3, 0x4, 0x80000001, 0x0, 0x0, 0x6, 0x1, 0x8, 0x7, 0x1000, 0xfffffffffffffff7, 0x8001, 0xfffffffffffffffc, 0x3, 0x4, 0x2, 0xeed, 0x1000, 0x100000000, 0x401, 0x8001, 0x1000, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000580), 0x2}, 0x4000, 0x8, 0x1, 0x0, 0x9, 0x2352, 0x10e}, 0x0, 0x1, 0xffffffffffffff9c, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000640)=0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) r4 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x80000000000000, 0x1ff, 0x720, 0x77, 0x0, 0x8, 0x40812, 0x7, 0x81, 0x80, 0x40d, 0x101, 0x7f, 0x8001, 0x10000, 0x3ff, 0x1f, 0xffffffff, 0x4, 0x100000000, 0x4, 0xfff, 0x0, 0x3, 0x1ff, 0x9, 0xb19, 0x7fffffff, 0x100, 0x0, 0x80, 0x7f, 0xfffffffffffffff9, 0x1, 0xc9, 0x2000, 0x0, 0x3, 0x3, @perf_bp={&(0x7f00000004c0), 0x4}, 0x4040, 0x2, 0x2, 0x0, 0xdc12, 0x2, 0x80}, 0xffffffffffffffff, 0x7, 0xffffffffffffff9c, 0x0) r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x4}, 0x0, 0x0, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r7, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a", 0x36}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r6, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r8, 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r6, 0x4) 2018/03/30 22:45:25 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000000c0)="705a0a29bb261274575303c4e6c6f18c9819d56bcf426dd2550ef4bbefacbf3a54fb3a65f6becb0150eb1eb0105b59431199d4226674316773a1f608cec085788c7caaea0e76481a9b96428a1a0f7408eba91ee6507dd475fd8e3c42c389c49ede7bb7b4bf6d80af07b4b8ef0c9eb23e33df17b051a660ca78c9dc417da5e2e571a9ccb1894a4d62355e83aacfa4aff3c5130e0081afe66cdd4ce7f4b1daf2b402f412c145817f00b59354ff"}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x8001934, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340)="0e59b3e7b29998e0741c5292a3aac41dadf4d29779c8ef96bfead6fe6d3c74070eebb3e3697d732643c30499d868164b8910cd6df1522706baabad7a651ee35052d98b19a88813ddb9a376323b736367be752019a0b63c0d63bbdec8fcd548689f49eebef0141a0ba89a3c637dd0f3de3e3846341b29d58e1e23c72fc717484162b1afed82508d9b318eda6f1418fd1b84f1533ddf933c1660ba43442f9be33b5a4bb275b6d5789165c61fab7cfd7dcf4b13f73cb11464fbd84fbb5a93326dafb9c7a5474a79d1cccae53ae9c13c28b317a247c30e1f", &(0x7f0000000440)="88740808b23b69f41bc698feab681cafe5a714091d4b87ac058925860a63b57f0fb47ccf89472a1fe1fd759488544657189bd5fce2139fe181ddfe63da78aca7e0f6cb39fe81f6ab115fcfc54c7bbc0258046c56ff23cfc80655f53e5a1ad80b0221b5b6221a64ab76bff60994aeeba3be1222ffa9c718fb3972", 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f00000001c0)="8841fb952a35e63b26bc987bb85777522e62fa17e820ac0f830cd57e937f0add309f381db861b21afb9408ba82232670e1d43ea70a9d364399e09b5ce78d3313307675e0a39a803cad25d09cd2a0ec9645522aec2374e05fe09d197d5850019ae8e0e3be3402759bc2750598e9d1a39115788ccb4edb678a6b3379c621f2695944acb61a3646b8d37b146534e3f175521f6f44c78f81d5e0339007d3b35c9fc1aa17c00b8c4c53fa2240f4eb01d65d45d546", &(0x7f0000000280)="05b57c807d56ffd061df7bad91b09a029be26e02ca26b5e847282bbecbb8b1f8e5c1d1ed5422e0d6c3a1a7a092718d87384f0633715ca2248a343c3ddab8d9020e390c8aa0f730e8a6896d43d2f3167d87d4cc30d6685f62d56ebe", 0x3}, 0x20) [ 2642.651375] devpts: called with bogus options [ 2642.668458] devpts: called with bogus options [ 2642.669293] devpts: called with bogus options [ 2642.686308] FAULT_INJECTION: forcing a failure. [ 2642.686308] name failslab, interval 1, probability 0, space 0, times 0 2018/03/30 22:45:25 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x78, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0x5, 0xfffffffffffffff9, 0x68, 0x9, 0x0, 0x5, 0x0, 0x8, 0x94, 0x7, 0x2ba, 0x100000000, 0xfffffffffffffffe, 0x80, 0x6, 0x5, 0xffffffffffffffc1, 0xff, 0x5, 0x7fffffff, 0x34, 0x2e, 0x0, 0x100000000, 0xfffffffffffffffa, 0x3, 0x5, 0x77, 0x1, 0x7fff, 0x1adf, 0x1000, 0x2, 0x7, 0x80000000, 0x4e, 0x0, 0x300000000, 0x5, @perf_bp={&(0x7f0000000000), 0xa}, 0x4000, 0x1, 0x1000, 0x0, 0x7fff, 0x7, 0x3}, r1, 0x4, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)="4c74093f1d849520abc47aa6caa468ea96579fe126b160b756cc63a15949c1d1032f956071a2b1656433e86759cdfdcdd63f0a4ba1969c0464821fcdc362fcc4f12c8b9bd69c1a504179a39bfc706f28a19bd49e1abe577d75e9f52721e37a7d97aa4a293d6bc20e13b21058a504ee5cd2ffe4b5f31b5b5ce8234ef68a396c731698af571c3635b2135b16d0468021c8a809d5ecb51ff0ab0841ca5a5a1f8b96cf") r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0x50, &(0x7f0000000300)}, 0x10) r3 = getpid() perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x2, 0x2, 0x42bdc52, 0x7f, 0x0, 0xfffffffffffffffe, 0x8000, 0x4, 0x6, 0x0, 0x4, 0x2, 0xb8, 0x7f, 0x1, 0x0, 0x401, 0x1, 0x401, 0x0, 0x7e40, 0x8, 0x1, 0x101, 0x8, 0x3, 0x7, 0x51, 0xda, 0x8, 0x4f5c, 0x7fff, 0xe1d, 0x22, 0x7, 0x100000000, 0x0, 0x5, 0x4, @perf_config_ext={0x10001, 0x100}, 0x0, 0x101, 0x5, 0x3, 0xffffffffffff4c1e, 0xd784, 0x6}, r3, 0x8, r0, 0x1) [ 2642.697637] CPU: 0 PID: 5252 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2642.704835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2642.714194] Call Trace: [ 2642.716791] dump_stack+0x194/0x24d [ 2642.720439] ? arch_local_irq_restore+0x53/0x53 [ 2642.725130] should_fail+0x8c0/0xa40 [ 2642.728853] ? unwind_dump+0x4d0/0x4d0 [ 2642.732751] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2642.737867] ? perf_trace_lock+0x900/0x900 [ 2642.742122] ? __lock_acquire+0x664/0x3e00 [ 2642.746376] ? find_held_lock+0x35/0x1d0 [ 2642.750459] ? __lock_is_held+0xb6/0x140 [ 2642.754539] ? check_same_owner+0x320/0x320 [ 2642.758873] ? __d_lookup+0x4f4/0x830 [ 2642.762677] ? rcu_note_context_switch+0x710/0x710 [ 2642.767597] should_failslab+0xec/0x120 [ 2642.771564] kmem_cache_alloc+0x47/0x760 [ 2642.775620] __d_alloc+0xc1/0xbd0 [ 2642.779057] ? shrink_dcache_for_umount+0x290/0x290 [ 2642.784057] ? d_alloc_parallel+0x1b40/0x1b40 [ 2642.788542] ? lock_release+0xa40/0xa40 [ 2642.792499] ? mark_held_locks+0xaf/0x100 [ 2642.796629] ? d_lookup+0x133/0x2e0 [ 2642.800234] ? d_lookup+0x1d5/0x2e0 [ 2642.803842] d_alloc+0x8e/0x340 [ 2642.807114] ? __d_alloc+0xbd0/0xbd0 [ 2642.810810] ? full_name_hash+0x9b/0xe0 [ 2642.814769] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2642.820026] ? down_write+0x87/0x120 [ 2642.823721] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2642.827932] ? down_read+0x150/0x150 [ 2642.831623] ? evict_inodes+0x580/0x580 [ 2642.835581] rpc_populate.constprop.15+0xa3/0x340 [ 2642.840407] rpc_fill_super+0x379/0xae0 [ 2642.844360] ? cap_capable+0x1b5/0x230 [ 2642.848259] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2642.853429] ? security_capable+0x8e/0xc0 [ 2642.857563] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2642.862746] ? ns_capable_common+0xcf/0x160 [ 2642.867048] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2642.872214] mount_ns+0xc4/0x190 [ 2642.875558] rpc_mount+0x9e/0xd0 [ 2642.878903] mount_fs+0x66/0x2d0 [ 2642.882250] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2642.886808] ? may_umount+0xa0/0xa0 [ 2642.890412] ? _raw_read_unlock+0x22/0x30 [ 2642.894535] ? __get_fs_type+0x8a/0xc0 [ 2642.898401] do_mount+0xea4/0x2bb0 [ 2642.901920] ? __might_fault+0x110/0x1d0 [ 2642.905961] ? copy_mount_string+0x40/0x40 [ 2642.910174] ? __check_object_size+0x8b/0x530 [ 2642.914651] ? __might_sleep+0x95/0x190 [ 2642.918606] ? kasan_check_write+0x14/0x20 [ 2642.922819] ? _copy_from_user+0x99/0x110 [ 2642.926946] ? memdup_user+0x5e/0x90 [ 2642.930635] ? copy_mount_options+0x1f7/0x2e0 [ 2642.935107] SyS_mount+0xab/0x120 [ 2642.938536] ? copy_mnt_ns+0xb30/0xb30 [ 2642.942413] do_syscall_64+0x281/0x940 [ 2642.946278] ? vmalloc_sync_all+0x30/0x30 [ 2642.950411] ? _raw_spin_unlock_irq+0x27/0x70 [ 2642.954889] ? finish_task_switch+0x1c1/0x7e0 [ 2642.959364] ? syscall_return_slowpath+0x550/0x550 [ 2642.964272] ? syscall_return_slowpath+0x2ac/0x550 [ 2642.969180] ? prepare_exit_to_usermode+0x350/0x350 [ 2642.974175] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2642.979518] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2642.984342] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2642.989527] RIP: 0033:0x454e79 [ 2642.992693] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 22:45:25 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:25 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:25 executing program 3: socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg(r1, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000a00)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea51b228d7caff935680b7c7b73ae6d8990f56bece389a29236c3859325de6a59edeb9b9ae1", 0x48}], 0x1, &(0x7f00000009c0)}, 0x0) recvmsg(r0, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480)="9b7815cd421eecc37df9250ab7496936ab4c75599ff96ba02ed5166be56df09fec2eef35318bf9b1311a39483f626e", &(0x7f00000006c0)=""/139}, 0x18) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) socketpair(0x4000000000a, 0xf, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x7, 0x40, 0x4, 0x0, r4, 0xab2}, 0x2c) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0xffffffff943f26e7) r7 = gettid() r8 = perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x7, 0x8000, 0xffffffffffffffff, 0x1, 0x0, 0x3e8, 0x40000, 0x4, 0x100000001, 0x0, 0x4, 0x401, 0x4, 0x7, 0x4, 0xc892, 0x10000, 0x20, 0x4, 0x2, 0x4, 0x8, 0x7b, 0x7ff, 0x8, 0x20, 0x8, 0x2, 0xbf01, 0x40, 0x0, 0x7fffffff, 0x1000200, 0x6, 0x4f4f, 0x5, 0x0, 0xfff, 0x6, @perf_config_ext={0x7, 0x28a4}, 0x800, 0x7fffffff, 0xffffffffffffff85, 0x5, 0x0, 0x0, 0x5}, r7, 0xe, r5, 0x1) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000100)) socketpair(0x1f, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r10 = gettid() perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x10000, 0x2, 0x401, 0xbf, 0x0, 0x8, 0x8040, 0x8, 0x4, 0x4, 0x358, 0xe1f, 0x4, 0x90, 0x0, 0x2, 0x9, 0x81, 0x10000, 0x4, 0x136, 0x3ff, 0x168, 0x3, 0x7, 0x9, 0x100, 0x100000001, 0x5, 0x218, 0x5, 0x6, 0x0, 0x5, 0x800, 0x1ff, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x400, 0x757, 0x2, 0x2, 0x3ff, 0x2, 0x800}, r10, 0xb, r3, 0x1) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000013c0)) perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0x100000000, 0xffffffff, 0x7, 0x9, 0x0, 0xfff, 0x20000, 0x5, 0x4, 0x0, 0x15d69fa4, 0xe92, 0x1, 0x3, 0x97d0, 0x2, 0x4, 0x10001, 0xad02, 0xba5, 0x2, 0x80000001, 0x3ff, 0x5, 0x7, 0x7, 0x9, 0x2bd, 0x3, 0x7, 0x8, 0x1f, 0xfffffffffffffc01, 0x2, 0xd, 0x6, 0x0, 0xb30, 0x2, @perf_bp={&(0x7f00000001c0), 0x6}, 0x2000, 0x7fff, 0x70000000, 0x3, 0x3ff, 0x1000, 0x8}, r10, 0x8, r8, 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000dc0)={r9, &(0x7f0000001940)="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", &(0x7f0000000d00)=""/169}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r2}, 0x48) socketpair$ax25(0x3, 0x0, 0xce, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000380)) recvmsg(r11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)=""/29, 0x1d}, {&(0x7f00000004c0)=""/232, 0xe8}, {&(0x7f00000005c0)=""/206, 0xce}, {&(0x7f0000000840)=""/195, 0xc3}], 0x4, &(0x7f0000000bc0)=""/205, 0xcd, 0x1000}, 0x20) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000e00)) recvmsg$kcm(r9, &(0x7f0000001380)={&(0x7f00000007c0)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000980)=""/90, 0x5a}, {&(0x7f0000000a80)=""/90, 0x5a}, {&(0x7f0000000b00)=""/171, 0xab}, {&(0x7f0000000e40)=""/107, 0x6b}, {&(0x7f0000000ec0)=""/245, 0xf5}, {&(0x7f0000000fc0)=""/33, 0x21}, {&(0x7f0000001000)=""/71, 0x47}, {&(0x7f0000001080)=""/87, 0x57}, {&(0x7f0000002940)=""/4096, 0x1000}, {&(0x7f0000001100)=""/159, 0x9f}], 0xa, &(0x7f0000001280)=""/218, 0xda}, 0x3) socket$kcm(0x29, 0x5, 0x0) [ 2643.000378] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2643.007627] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2643.014874] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2643.022120] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2643.029366] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003b [ 2643.036890] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 22:45:26 executing program 2: mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ncpfs\x00', 0x80802, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)=r0, 0x4) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='btrfs\x00', 0x89402, &(0x7f0000000900)="e196efa3cb748d2a6600968b76295ff919bc3877b18eb8d265a35493fcf34fdc965cd5c837d2389c6e2ec6088abe8daaa8ca23f9298fc94dc26874bc4d4567afea1ca0879cdf21e915005a83e96b1002af29091d2176abbb7fec088a67f2e1390f32adaf2f252d24510870f8df7186936f4d88957eb8fcda78b7383a7d24db701d524557ee7324433e70d9ffa185098325f9e657d3c29cf6a35843cb96780269db1c735d55938af5c60e1e4ba25928697277b0fdf356b62399b4c8826d09bfca7d6078c19b4995195ea814b1bb40c06210ec4a97f9") ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f3, 0x0, 0x6, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x22, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50}, 0xfffffe74) close(r1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r1}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x0, &(0x7f0000000000)={0x0}) mkdir(&(0x7f0000000100)='./file0\x00', 0x1000000000) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='selinuxfs\x00', 0x1000, &(0x7f0000000100)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r2, &(0x7f0000000240)="f69086e24ea9d114f0723c7f3257d1af76f335cd4f94f345d481d8b883e140fa7261bf105e7419413464d7920fcd1f690bf3818f7458f4fcbb508667ee005599d500325dd559a728af8936b33de1ea4e3fb2573079ef29b4980591cccab8c57998decac40e790377343e3b9d857ada81a4802784fb93d9fc344064f542e64f14057c5fd14edef8d9c4fad142197b0268ec10c423c19bcee68947e8f7285131199ec638df3b9a42f92304a2ce62e8ab341c1bb942758f54a12719d0e431d5", &(0x7f0000000140)="d13214320913b75af9ba4a6c5a6643aca5a9e172b029f2394c4f", 0x1}, 0x20) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='minix\x00', 0x10020, &(0x7f0000000240)) [ 2643.112694] devpts: called with bogus options 2018/03/30 22:45:26 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x0, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2643.165806] devpts: called with bogus options [ 2643.214968] EXT4-fs (sda1): Unrecognized mount option "ö†âN©Ñðr<2Wѯvó5ÍO”óEÔظƒá@úra¿^tA4d×’Íi ótXôü»P†gî" or missing value [ 2643.264490] devpts: called with bogus options [ 2643.286453] EXT4-fs (sda1): Unrecognized mount option "ö†âN©Ñðr<2Wѯvó5ÍO”óEÔظƒá@úra¿^tA4d×’Íi ótXôü»P†gî" or missing value 2018/03/30 22:45:26 executing program 0: r0 = gettid() socketpair(0x19, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1c2d, 0x62ba, 0x10000, 0x8000, 0x0, 0x40, 0x800, 0x8, 0xace, 0x8000, 0x8, 0x2e, 0x101, 0x1, 0x20, 0x400, 0x29, 0x0, 0x1, 0x10001, 0x0, 0x5, 0xe2b0, 0xfffffffffffffff9, 0xfffffffffffffffa, 0xc6, 0x8f9, 0x0, 0x7fffffff, 0x7, 0x3f, 0x800, 0x7, 0x8001, 0x7, 0x5f, 0x0, 0x7ff, 0x6, @perf_bp={&(0x7f00000000c0), 0x2}, 0x4680, 0xfffffffffffeffff, 0x4, 0x4, 0x1, 0xfffffffffffffffb, 0x9}, r0, 0x8, r1, 0x8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000100)='\x00') 2018/03/30 22:45:26 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000cc0)=ANY=[@ANYBLOB="180000000000a6f98b259344d9e5ee000000000000000081000500000000000000000000000000000000000000000076b2325a979914"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xffffffffffffff0a, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r3, 0x0, 0xc3, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r2, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0)=r3, 0xfffffffffffffe85) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000b80)={r0}) recvmsg(r5, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7}, 0x10002) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xfffffffffffffff8) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) mkdir(&(0x7f0000000c80)='./file0/bus\x00', 0x181) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r9, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r9, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) 2018/03/30 22:45:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1e, 0x0, 0x3, 0x6, 0x1, r0, 0x6773}, 0x2c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x2, 0x7, 0x8001, 0x10, 0xffffffffffffffff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f00000004c0)="a3261c57", &(0x7f0000000500)="cd8249bf39d6176ef7346799ac199e6cf9e7fe02418812a394d9c874384d4ba7bd9d3b261f1a018d54c20e688a5dc8a23babc41d618eab351795754d5fa3ad297aec7e01f2990b", 0x2}, 0x20) sendmsg(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)="654e8525c3d8a3a269fffab981c018ecd1ed1d41250e8cefbd5ee4bae370ceb76f18994299803c8f3c007db0b506d27a8d38bfd14b9dbdb9ab629de7de0672b365dce9cc2ecdff6971cd9b53ca275ecf9b426cade30df9ed069f246ad81f0fb4cef7a4d8504b908dddbad5235664fb43456c105d465f9e08de48116686d69255a3fb4d9f00907b0d2bb8743018c8568cdd1a098362e9db2beb107321a56d3b31b84590e0ea80d526985b20473a7c", 0xae}], 0x1, 0x0, 0x0, 0x80}, 0x20000000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000cc0)={r0, &(0x7f0000000d00)="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", &(0x7f0000000c00)=""/166}, 0x18) mount(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='pstore\x00', 0x4, &(0x7f0000000640)="afb63e3ff55419f9e9572aabeb90d8184a20d3c850fa576f0f0d376978dcd77395a8eb26002ef5146d") r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x60) r3 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000000), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xfb2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003700)={&(0x7f0000000280)=@pppoe={0x0, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003400)=""/251, 0xfb}, {&(0x7f0000003500)=""/14, 0xe}, {&(0x7f0000003540)=""/107, 0x6b}, {&(0x7f00000035c0)=""/211, 0xd3}], 0x4, 0x0, 0x0, 0x3ff}, 0x1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000ac0)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)={0xf, 0x61f3, 0x8, 0x2, 0x0, r6, 0x3ff}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000a00)={r7, &(0x7f0000000980)="8da5278de09964879bdfc0940038c991c310ab83636d0bceac8b", &(0x7f00000009c0)=""/59}, 0x18) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x100000001, 0x3, 0x5, 0x2, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r6, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) mkdir(&(0x7f0000000a40)='./file0\x00', 0x80) socketpair(0x10, 0x5, 0x3f, &(0x7f0000000840)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x89e1, &(0x7f0000000880)={r4}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000800)) close(r5) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) 2018/03/30 22:45:26 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:26 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:26 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x0, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:26 executing program 1 (fault-call:19 fault-nth:60): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:26 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f00000000c0)}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x1f, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000010c0)={r1, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), &(0x7f00000000c0), 0x2}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000200)="a4f9eb7d35871ca6eb0967c03ddfb987badbc473e123ba7b9387411b81f887846f1e116a930e158740b6354478c0679bd0cbeb03ea65b6b651760a87c898751639233314295210a3ea2c6476110d4878b9fa9e0bc9be0459e8e01dd335d6aa218bc99c9f"}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r0, 0x9feb3385e626ccdc, &(0x7f0000000340)}, 0x10) [ 2643.432210] devpts: called with bogus options [ 2643.446396] devpts: called with bogus options [ 2643.448708] FAULT_INJECTION: forcing a failure. [ 2643.448708] name failslab, interval 1, probability 0, space 0, times 0 [ 2643.462343] CPU: 0 PID: 5329 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2643.469541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2643.478911] Call Trace: 2018/03/30 22:45:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair(0x1, 0x5, 0x100000000, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000180)={0x0, 0xffffff94, &(0x7f0000000100), 0x0, &(0x7f0000000080)=[{0x10, 0x0, 0x6d302cc6}], 0xb26a}, 0xf) 2018/03/30 22:45:26 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2643.481520] dump_stack+0x194/0x24d [ 2643.485166] ? arch_local_irq_restore+0x53/0x53 [ 2643.489862] should_fail+0x8c0/0xa40 [ 2643.493584] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 2643.498607] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2643.503710] ? perf_trace_lock+0x900/0x900 [ 2643.507954] ? __lock_acquire+0x664/0x3e00 [ 2643.512200] ? find_held_lock+0x35/0x1d0 [ 2643.516271] ? __lock_is_held+0xb6/0x140 [ 2643.520348] ? check_same_owner+0x320/0x320 [ 2643.525215] ? __d_lookup+0x4f4/0x830 2018/03/30 22:45:26 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0x0}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x200) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x40049409, r1) [ 2643.529025] ? rcu_note_context_switch+0x710/0x710 [ 2643.533972] should_failslab+0xec/0x120 [ 2643.537958] kmem_cache_alloc+0x47/0x760 [ 2643.542038] __d_alloc+0xc1/0xbd0 [ 2643.545502] ? shrink_dcache_for_umount+0x290/0x290 [ 2643.550535] ? d_alloc_parallel+0x1b40/0x1b40 [ 2643.555044] ? lock_release+0xa40/0xa40 [ 2643.559042] ? mark_held_locks+0xaf/0x100 [ 2643.563207] ? d_lookup+0x133/0x2e0 [ 2643.566852] ? d_lookup+0x1d5/0x2e0 [ 2643.570488] d_alloc+0x8e/0x340 [ 2643.573861] ? __d_alloc+0xbd0/0xbd0 [ 2643.577577] ? full_name_hash+0x9b/0xe0 [ 2643.581568] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2643.586850] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2643.591103] rpc_populate.constprop.15+0xa3/0x340 [ 2643.595964] rpc_fill_super+0x379/0xae0 [ 2643.599950] ? cap_capable+0x1b5/0x230 [ 2643.603839] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2643.609029] ? security_capable+0x8e/0xc0 [ 2643.613183] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2643.618373] ? ns_capable_common+0xcf/0x160 [ 2643.622698] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2643.627895] mount_ns+0xc4/0x190 [ 2643.631282] rpc_mount+0x9e/0xd0 [ 2643.634672] mount_fs+0x66/0x2d0 [ 2643.638052] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2643.642656] ? may_umount+0xa0/0xa0 [ 2643.646291] ? _raw_read_unlock+0x22/0x30 [ 2643.647488] devpts: called with bogus options [ 2643.650433] ? __get_fs_type+0x8a/0xc0 [ 2643.650449] do_mount+0xea4/0x2bb0 [ 2643.650459] ? __might_fault+0x110/0x1d0 [ 2643.650472] ? copy_mount_string+0x40/0x40 [ 2643.650487] ? __check_object_size+0x8b/0x530 [ 2643.675109] ? __might_sleep+0x95/0x190 [ 2643.679092] ? kasan_check_write+0x14/0x20 [ 2643.683326] ? _copy_from_user+0x99/0x110 [ 2643.687477] ? memdup_user+0x5e/0x90 [ 2643.691174] ? copy_mount_options+0x1f7/0x2e0 [ 2643.695653] SyS_mount+0xab/0x120 [ 2643.700222] ? copy_mnt_ns+0xb30/0xb30 [ 2643.704090] do_syscall_64+0x281/0x940 [ 2643.707958] ? vmalloc_sync_all+0x30/0x30 [ 2643.712091] ? _raw_spin_unlock_irq+0x27/0x70 [ 2643.716571] ? finish_task_switch+0x1c1/0x7e0 [ 2643.721051] ? syscall_return_slowpath+0x550/0x550 [ 2643.725961] ? syscall_return_slowpath+0x2ac/0x550 [ 2643.730869] ? prepare_exit_to_usermode+0x350/0x350 [ 2643.735865] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2643.741212] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2643.746043] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2643.751232] RIP: 0033:0x454e79 [ 2643.754400] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2643.762099] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2643.769347] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2643.776596] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2643.783844] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2643.791092] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003c [ 2643.802856] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 2643.885162] devpts: called with bogus options 2018/03/30 22:45:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1e, 0x0, 0x3, 0x6, 0x1, r0, 0x6773}, 0x2c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x2, 0x7, 0x8001, 0x10, 0xffffffffffffffff, 0x1}, 0x2c) socketpair(0x11, 0x5, 0x0, &(0x7f00000010c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000001100)={r2}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f00000004c0)="a3261c57", &(0x7f0000000500)="cd8249bf39d6176ef7346799ac199e6cf9e7fe02418812a394d9c874384d4ba7bd9d3b261f1a018d54c20e688a5dc8a23babc41d618eab351795754d5fa3ad297aec7e01f2990b", 0x2}, 0x20) sendmsg(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080), 0x1e}], 0x1000000000000020}, 0x8000) sendmsg(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)="654e8525c3d8a3a269fffab981c018ecd1ed1d41250e8cefbd5ee4bae370ceb76f18994299803c8f3c007db0b506d27a8d38bfd14b9dbdb9ab629de7de0672b365dce9cc2ecdff6971cd9b53ca275ecf9b426cade30df9ed069f246ad81f0fb4cef7a4d8504b908dddbad5235664fb43456c105d465f9e08de48116686d69255a3fb4d9f00907b0d2bb8743018c8568cdd1a098362e9db2beb107321a56d3b31b84590e0ea80d526985b20473a7c", 0xae}], 0x1, 0x0, 0x0, 0x80}, 0x20000000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={r0, &(0x7f0000000680), &(0x7f00000006c0)=""/166}, 0x18) mount(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='pstore\x00', 0x4, &(0x7f0000000640)="afb63e3ff55419f9e9572aabeb90d8184a20d3c850fa576f0f0d376978dcd77395a8eb26002ef5146d") r5 = gettid() perf_event_open(&(0x7f00000008c0)={0x5, 0x70, 0x34c0000000000000, 0x0, 0x1, 0xfb57, 0x0, 0x4, 0x100, 0x2, 0x6, 0x80000000, 0x1, 0x4, 0x7, 0x6, 0xf70, 0x6, 0x0, 0x400, 0x7ff, 0x80, 0x7fff, 0x7f, 0x5, 0x788, 0x3, 0x7f, 0x3, 0x9, 0xad2, 0x2, 0x9, 0x7fff, 0x7ff, 0x5, 0x0, 0x5d4, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000300), 0xb}, 0x0, 0x280000, 0xff, 0x3, 0xe0, 0x1, 0x100}, r5, 0x4, r3, 0x3) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000940)='./file0\x00', 0x0) r7 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r6) close(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$inet6(0xa, 0x3, 0xefd0, &(0x7f0000001300)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xfb2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f00000012c0)={&(0x7f0000000a40)=@ethernet, 0x80, &(0x7f0000001140)=[{&(0x7f0000000ac0)=""/185, 0xb9}, {&(0x7f0000000b80)=""/246, 0xf6}, {&(0x7f0000000c80)=""/131, 0x83}, {&(0x7f0000000d40)=""/226, 0xe2}, {&(0x7f0000000e40)=""/129, 0x81}, {&(0x7f0000000f00)=""/133, 0x85}, {&(0x7f0000000fc0)=""/152, 0x98}, {&(0x7f0000000980)=""/45, 0x2d}, {&(0x7f0000001080)=""/58, 0x3a}], 0x9, &(0x7f0000001200)=""/144, 0x90, 0xfffffffffffffeff}, 0x41) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003700)={&(0x7f0000000280)=@pppoe={0x0, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003400)=""/251, 0xfb}, {&(0x7f0000003500)=""/14, 0xe}, {&(0x7f0000003540)=""/107, 0x6b}, {&(0x7f00000035c0)=""/211, 0xd3}], 0x4, 0x0, 0x0, 0x3ff}, 0x1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x100000001, 0x3, 0x5, 0x2, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000a00)={r1, &(0x7f00000009c0)="e4970e592c2e3341", &(0x7f00000008c0)}, 0x18) socketpair(0x10, 0x5, 0x3f, &(0x7f0000000840)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000880)={r8}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000800)) 2018/03/30 22:45:26 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:26 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x0, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:26 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000880)={r0, &(0x7f00000007c0)="dcb978ff0256a304b2b808b8ca6193f350f0b1a3453a1de5", &(0x7f0000000800)=""/125}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000380)="30e499c528b5ad6a60d5db6c7935df0d093a86949357a10f3ad47184a214d8a9543c044811d6f7e245d44dfd7f2d7e9d0d30d37500000000000000000000002b0a8042f804779ad32c2a7dbb457c9195c99aa4e3eeb91e47820aab1d1b7a593bf04f7f8f8261e44736fe756aa5d14c9934f07d22fcc395ea1c45da036d3edab70516f3e0248c43739587b60cd8a0ec3c95ebed56241dcb2376b76b256b197a5f200fcfff741094a59d3ad31dc1", &(0x7f0000000200)=""/210}, 0x18) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001800)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000002980)={&(0x7f0000001840)=@nfc_llcp, 0x80, &(0x7f00000028c0)=[{&(0x7f00000018c0)=""/4096, 0x1000}], 0x1, &(0x7f0000002900)=""/98, 0x62, 0x6}, 0x20) socketpair$ax25(0x3, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000e40)={&(0x7f00000008c0)=@nfc={0x27, 0x1, 0x2, 0x3}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000940)="772e9703697515dfe81f05535134b1e1dd76c979fdc9d2f5d30ab845b8021dbf0624824dbd84745ae5de77d1647a0388d7f915efaef1c11c55b58edb58db58c1ac04c7400de33d9654a407958b8eeff5736e5b5bbe17a6933c7bda59aab33d6333f282732da32bbe92830478aa4c740071e92ca73e4fa18eb788cb89cfa727ef00b558cd046ea567f6a9b178fef63f3f146a34c2ceef8d114c44078d82a22a6ef766a71e94fda91271bd6ac2ea28e43c344625e3a95fc973b0a3c3690add6fb64e0bbcb2900c76e53c30ef883064f35d5ef827875237ddaeec481cbfa3794264f62d031789fcdd1e41a64702", 0xec}, {&(0x7f0000000a40)="192b6f03566f7f855de239e728cd9eb25da46808c2ce99dbabc5658a3fb052a596610993e8da79f9cab60702efe985266ccbb20f8bfc8311812def8e55259f1f46c964b005f4fde677ada635b998f8793c7dc3b86af574c6577c00d0ddf0b4fefb6ebdda725a414deadbbda99161cdbfc485c8213227acbd3f9fedb16e90fbadb80ae1145907c3b8c104e16daa24625a176bf4abe1fb4ef6f9df5d9bd81133a5b06ea41ec3934382c60ffb0599a1b395d83c62c3d4e88db6aae8cb7eb4a69627de8c6b88", 0xc4}, {&(0x7f0000000b40)="783f9fbada6a355f663c23da330e35e191f242d06681f08850ff6bc34f0bb2b63eb6cdbbbe211e17a7076d6a109153be2066c8d12f12dbbe95799ca8d9b6eda61873be115251548dfb5ab9acf92233c6103e9efb13d6264d76da678a96568a544207e29d78503529c92f5f0f610be98bde2cb1d26fd16383ddd5171d6ff74aa8e1c78e2da3aee19e3c62a1395bb16df084f99616ed7daa1ac582437e06b116ab5f40", 0xa2}, {&(0x7f0000000c00)="19e2c19adbe1eb739c55dedcd0562dd2fac2fce3967fa1a1fb929b2ff17fb313a9a6f72793186dbe2e6461168b3812a7e3593f0e9e65e2ee65099b8fec0f134f95ec7731ed8c665c736c5ed07681181ab4039a242fa38b4babbd1f9300334ae664a6d75f5ad48b117fedfc7146a4fe313ddfe3e0abda3d95c360b574313281fa59310ac03078ee6b79a8d8b624e41dc4646f9a1c0ee64681d4445322aead77141536a05d60bfe8940e81d582a4c2862fcebd143fb5df97edf21f06dd25d9b24f9ed63f302ae691b69653091b60b9ec1fcd67d8668dbd8cbd0889923c", 0xdc}, {&(0x7f0000000d00)="da9d1a8c9107fd203a0d4b720fd3a4bfe5cfd4ebb04d63558e113cb121ed76e2dbcffd154a48cd2326ac86c980b0860a066e675892143f7243f506842f58d59a0c34d5eaac810a024a53b0878e1e4072ada2a1ffcb9746d9e2d16f33585efc02e6b9dc9cf13787dbe3a5a7d0ff1055438b141f72dc2b30e8fb2437e5c7a01e615cd5c4456468e4f328546cdee5cb5140d23798d236d30d12de6c26d8f4bf2a07a9e09fe804453bc3463141a45b036a2a12df9632433e65e1e7938a", 0xbb}], 0x5, &(0x7f00000029c0)=[{0xf8, 0x84, 0x81, "23a844a92ce0d859964393cadd36843f4c531c53234ec2437c609a041d7a7bd9b9cbfb280097d068aa18d08f5f902f95a9e0c1480948d12e74ab41ec7f806dfa279d4e5b47b3a28b8d0ab0f64a26819ac814c43919284762d038212878aca81c0287337077312c14ddeea62363c12335adbc02111dc2b769a87fbe9c825c439e81a501f0100e84866d7c06386e89572120ba4bfa2f70e6ce9f5051829e08fae7123d83dc24dd589218d33687b7b7b9cb59ea57be7c5e515e1fa5f6e10cb70d1b5b977a15c197f64b345798c129fae7859524e6070dd64b04537cde90facaec7ad10cd187ef7f"}, {0xc8, 0x10c, 0x67, "ac3bdd3447137e79a7cb0d6330cacc3d5affe80db29d5105a81d632241f03e31cf66633d2d142340faea6b29370a0f51cb4118c569f3c075ba407de5c955b86e7d2bb19c31ca51630349da4f90091e0123899aff2d2deff2d81bdb098e67b37cfce1a27df6601aa0a2415154abe56a2ed79599bbbeeacd929ff635682e8b3f0af5a6394e9d0ade637cc5e6548da7b5eb44100c2d7e7ca48876e697030f19d05c892e932cd3ca5f24870897406ba9922f6c"}, {0x1010, 0x10e, 0x8001, "025e88f84fefa4ca9abf336216e981d084dae077e0b3d86e036957cc87fe89f54c2a5010621caa6e973203800941454333fd32d845ab75264e48f8a6f57caa2740a4ce4c40402ae6eb82def68a292b167e7e8ec3597c3aed8a8a9e92991aa7399318c6f17540c6892c13fa26caee81cb063519929ead4b2f8e6de65bd8cd203e364ae97c77a435d8ef709ca014a244c2208c9beab02286b4075cdc30f9358c18b571f0b18b5fc4b638182109bcd62c28bc758b5cc0a60e82554ff75e336c1e88d9ea31be4a2bb8e87d01672e2ca314b0e307450a051da7d01e06b4f6330b247684235195ac8d1955feadf04fc9626618700a416daae47647cf5e5769d57e53bdc20572a7f3a546831537ff05c09cb4ae781e60102cc066d5f6ae9d22093a4d42f3ba889d7af1d09b266c11d68b2380e638eaabf611522cb8f21d9f808642b0ce9b541dec2440dbe50c1de749f8771ab22128b60ccf1d64073e7e9bb22c12e1e2cf4ad8781b17f8993ee8aa44897b275f46af735e6c8b025e80784752bf8b177cb38bca3e79a5bb217a92c0633969c7eb2ab11bf54efe94b5d02c1f29d9f299e76d3e3e47258d56cdc785d684fc0699bde382af4ab0746d7754891eca2620f86e19fba75ac224e33b96798ff1489e965693e93cfdff63f122db3e76226ea989dd059b76c236b6bad99b6f69b8400e5bb480a225741f468c4682ee9fc96aa56cf57f24863e4f4d626ca7eafefaaa26d2fea32c334a3d8d61056de3ca9ffbf604e33ab72956b7650e04e0d5121ae7ef8fdbeaa8a5ccad871e4f17caf587bd222690ff09463524a57fff83514227881d821b782d8389197f0fb014d8bb5b85fa481c10aa2006fb74e7fec771e1b29bade266bcb0c1b82bf485fb0296b431421270738a97bfd57a16f9999083f8509404ce4a79e56410eaeecb09697339b5dfe390088ff9fd5b3578e57f38ae22a95304081866fb0297c4607ae0586617709ea43f2cd5a973248b77fd9a8a4fb0e8b8a8ecfea3328e45080e5371a97dd468bf69ddcda07c66b3a2353be09278df8ac4b26ca96aa18626e5bc6bc13677a062eecd2610267054b1d4e4fdc55fa3f75c9f97cd296a0a8047e45dcfb7bb9e493267c9aface9d4ea7e76f575de06d511f64310a6e7eb7fc22f745e362c0a95cc46260c6613fe3b3e5159c6dc1dfc071abfea243a979a4176f11a9aec4e5edaba17a5dbdb4421ebd5772e600225e814dd7bf839a8c03b71ba4dc7624adead6494eaece8f0d620444d3caafc8fac68146d3f55c2f9a95e358dd128a6cfebb62f047f9244d3699f97d18951c6d3d72651bc312dfa95b2304605cd799a7f23fed3604fbc34e6d8623e731eaebdfab9c803aaa1ebc60486db4907dfb08dd57d12d1a17074cf249f8a6e7107ebc32fce0369e00dd18755087ebb71b4b236ea0c0db1a1b87d5e9ad9e8a8e9abb33b8a33460dfc9d69878a0a92d5bb0426425b524e7d6d1d7c9805e7241265436bc79966304b9091d1fd1f429525d2eae16718511c7df780a0ccedac836142f9e62e38d19c744d0c5481c1e6b624b05d98e60d5e0c9cd185645719babb217fc53e7c0694395dd4653e78d97e71543612048f657008b2b3d971fc1de37865c771b2d6662ab3c07f7cda7bc3da7fc510fac3c94ba7765e9c2a627c52f9b2a56bb177a7a6523df8568c9d155f4c972220eb086076e8b0e2ad422b7617a65c504d014161994695e085fcfc9e9aa38824f79e1234b8fd507d35edb45c398e1d9b1f82f6a92665010a223574431a9e84ef7e5bf6b7cd99423c1fc0f1628fe4017c17a72c97b622ba305bf4bd867600d4eb40ad0c2e1ce39a5e7d9b41a9b460b306f9467c23dce5a2ff6626c56896a91ab2576e51bf3842e405b450fbaecabfbffbd9751f1d48aac9fc08bc330c76574e098827b551f06f493dd73cda7b92e7570ad5844296ab6d0203f8701d328084c53b6964230e33c23382903c2fed24c2535bd3ac087a6e6c451aa9f6e918e408633a943cd0e90371bf7f06a588408fc216be176ac19fe647af911e874f9d13ed3a2997854b64f6052df710fc67785a80376c994f4c0a855efc8d5ea67cd4365217179e14638b3f47ab29ca72e5ed74bae7d660a19aa2e02111bdbd8ab0ad0698c4ab6d4829c595dd950689b57948adb9355678cf21c98ff3ebff6e4dba8714bf2a07499041acbab5f61b7f1728a45fd83f4809ee6a06e8e4e744ff6961452f90aabbe6aad451a1eeb7436fdbf6ea0721178bb94231818e3cacc51285d850b6497b31af8bab0929555c6ab4861acde55f0037b53c634085367c45db40c3658524bd120ffbc69de8faeb70217508221aa4962b7fd52bbd75640ec41461394e30bae82645b41420cb8be93d9a49c3d6c4686aa6337a6a08ba9fe60d8c5a274a2746e7c61baf50cffef2e4801682de6958cf0fbaefd50152f93063025d4e7441f6cbd56e7e9edeb27a8e11b066d0a299b8aeb8de8850eacab6f3072aa5a5eda9c7f380f8d1236ae6495780aee8200703a6b93d2f5ce5f0cf18d2d6eb9226cad99444dc5641813098b23fd5994199c3d12d711077088bf2dbf250957c187cb6c347e8fd36e61c23230339621c32b3c69bd44d2bca3ddc53fbb7a3f9d979e41e10898c1195e7aff9fe1bd079cc8504e86735b8c592d8dc23622ce486b85f720d90ceba4a40e5c16b7f241f95fae11cea78c5392bb7598b1fa2828afa5196e7de9fcc3457ee99d09464005a69c214100f040eefb5c19b65d15ccb9587f2f9ce56392e1272f2cee9cc5a7804ddbd4966d6b9327e50bd4b5e45fc3c01f6ddf034b55fed1d0a791e13e435152db2f33e8d3b99044a26a81b86184d1ec0a9baa650e887a11be94c1a583aed3c76720dd02ee67d6bdeb1976292c3512df8e89e3537bd1bf0e0e2d4b4a84ae7d545cae7e7fa9f245accb176a58d8cb6f7aecd343fbd6efa244488ae8c6b1731229e7a60eefd692b7e2fbe5dd781be034515f61fa7e260cc3398f9991266a2e9d94ca9828ef32dcbcabfe28a65097988f207d0e71a3f8bfd2760bf0e231a88de17230005d087176c690d02542f50c853640b6495634262190870f511612dddc1913ace692d8cd1e6c1e3c01030cb5223a0ad1f7c48ed61c64d8921654c476efab227ff3c78139b3c982f4a282f312a5191f44ab8fe0dcb5bdeef9160b811fb2ef627711752f956cf0484488a4e4ad05a9923f1c75478db6c53ed706c5d2fa6e4d808fd43046a27adf00cc11dc68561f48d2283ff68f7790dc353a4cd47b362c2441278ff2014a016ea009bd1aab5fb4317384728355c3c96ef303a2f14843f0744085e3404e25726a8dc2311ff7736cd2429c82005dca6311efe2790814267075bc5c3df3faee5078570c7557e0236bbbcb0383ca959cdc110a615240b95a12bc8c8a01180de10b86f38d8c89a15f67b2ead9f1881874a5f556643e9705374cb8cc62796492add3667343a32eeb52895658a13484e4b9d5b72d279a7c02ac96df41979a4803055967e131cfa4170a99bdf38e05eae85a46af7e36f2fea9ab14f7027ee2bd5e885919409a6eaecd8b47eb9f07908fe309922045b72e25ae3afd1b403e506d7647dea5c09ae0bd12e8c71795ffaf7125aa355c062ff8f0792e0d9f96bdfcd653eb0ab8c1410ef2b8daf9ec33aef6933d6738e34f579bae58eea1070ca2c85b571f541e016d855b62dd15ec7eec30584ec69f94292283e6a396472439737984eeb59120fd0968a23449495004463f816fdc9d6e767447bfec8e90c0186971f36487e278dc11cbbb2974b99da95fce0cfefd835fcf8e66433b1471819a80d8d16ebb2c98e14c41b6b2f57b9e183e6ce78aaf610ce60cd4c99919e02e20f0da23b7b16681a545cdeb03ab3bc74c40194e30b2e7cf63e224015ca4ec1bedf3eb1e6c6f20d77f9379f7fb2ee155bd4bc526d37018e02891b0717ca9a46b8885aa695d0165a06c46ca3adad064f7ed3802df3382acb747d6efb5240293f99799c720aad973c850a8a2ec132e472ce4323deda319a8e9b1d75c90127bca6c6345242638aa678127c7fc805b6e98433629181fe91dd492e508336845d11a966c532c86fab99590503afefc3cc2ef294c7969f90c8f91d66b49ede3d8506d8a77844840db714b4d78339ef30fa0c014548afcc7b72de6e57c8f1313ff29e90a238c900c2261681112009e6db6a7f6c41e2c81269bd1cd1c7b5a4455ed237b27fa462267d5eb17b8195b64c4fd04d5ab21a4bb6fc083d270f3078677452667b8415d68272f4c49db5ce06bc560b457c6e5df7bf3831254774bbe3a8f2f47e7bdc826a057c4b6e69c23cbc0abc405fffd0cbd0a9f2332b892c7f6c2dcd771afb69f878005e48cfa9de9077b06bfcdc08787ad84af8af188e1ff43a74c972815499bc6ef9c660c32f98410761a1b6a57596403d5172fcadaad3855fdaabb4879d87196869e57b7b3952dc5c556411cf8b0961bc442313015abc0493b682a4a6275d7494fcde4073853276a4ca6bed23ca1397e2785b814648aa513d1e7e1b0a7dcb71ce643d71b3be85301da85e1050667f653e4ded2c1f58133a5e741f40dcc204797b17fec3cf2ca15e40c78af26837f6e39d7924473499e3c611b51439dc4ee1493982ff7a30cbe82ceb2affc0eb401081f5a5714a29c1959b333a6d9d235f257beb0daaeafab35b38d74ed749ad5ffec351e3af735c3cca8f89569c5b42420edd6e0c25099b46dd895d1d6781338fc06a8c5c0c8cc5c5e800d08c7ab9bd9ae7b62bbe11eabc8f885794ba27b788dc28560fdc30c8eec5b9b4491f2b3cfc5dfef1e6d2218956b36f40280c87b204067108465ca21046efb6c0d7af968e506905a5d3c7f2ba4f8665473354e86616746b81526f2e78cf0ea3a73fa6f12793eafe65d9450301f959c5291942d5679f3edf5df2ccf51bbae20f0966a20570bab72bb12eadf88786245cc22a22404e32718a9b190bdff7e035e1403c7d4c91ca10b03b67aa3138fb0b1c1db542af213a21979015b5f5dee98893d95d2a1c9d518d79da81b7cb87cc3be19e820ea4ec0a6541ed8e54cac7bbc269ff7e35210efc2d0361e9cf4161eeded280dbd826e9b6f45c5a946b146230aa7656f1d16fcefcb8a596ecff51d0297a94eebc2697c0362cf8df7664f03631314b6bff87aea532645f935c8c289e31b10275bf055f8b3bcc29ce9bd9054d128332db6df683a2ae6dfeea09a5a572ba24802e7143ab7396c9e3ddf0cc760a496f7a9fbcfcc76abbb031da7a19d0f2a86850ab08e15c979d2a2a3bb64c41b0accdde2403c5f65c05275748c7d84871540cbe6b5ecbb3d4fbc318e8f551c0f9e14229ef79acc6e6758fe61f97f74c537d12ac850ba76b705bdda792b3c32b7780a65c5a3b335dba9e059366f45327a99d6eb8b081bb3a6d03d0f3b7276ee4eae0df753f13a14f81af0fdebd058c189af45d20a9c708278a45f310a0db0e1675fad2a4e336f0110238973d96dc93e5452d18d66281f0915b0e0d399a3b5e497a92bf16c7292ac4bb1f5ba7e3ec214eeae98d6922bad6d15c053127b1760cff84dbfb408bcc5b61a2ce4aaa97dac0e2a094f00d90f8d577b7316ed88b4615326b37a22550bbebfc690e7e7f0f9c01b6339ad1c60f59e3b44f46e40740b7aae1bfb7611c99ca341d58f49b1c110ed8d598641b0d07308b77fa62772f9ea569e88e600bcd961af55a043e0168ecb0e70c107f468a5c446213dd5ae111398fc6701b6220baeb2bfdcfff5b5a4381d7b6c424d145cf76"}, {0x80, 0x194, 0x3, "e18bac771f52872cf4242f81216520f56a0f3ca29f6153ef81f33aaaf7c8e483f9d0d59e5c27149af19af52e784b0c46128116ef5a25e6124b24cf28534cd171cfcdc0f2348c9e8ee3e888e7bb5207e615b6735e98d6ce17cf2061493638b7e90aad538de857dce4cd8908931180"}, {0x28, 0x103, 0x400, "962aa43e02ef22124b0a46fe6267a3746fd604c58a97e6"}, {0x108, 0x88, 0xf68e, "738c37e864e53dc6960789e6b3a67863cddf491270b9d7db9f29c059251d6ab7ea1325e81c97f67bfdb42d2668616138444adba2b3e03a3fd9c668f1cd21de59b826f15580fae546590bcccf8e8cbb8b525fb81983b3ccc2cd88946d298596f9cd186770f2b069d33b936da02350c7295e7b5bc3ee4918d6eb065c28b83c187673251ad7ad382b1c4c28396511d95942ef1438010c7d5ba9049284f5cf4288e13b7684c7b8de712b8e82a0b051b8351da6737a0e3d867174f0c70b92b3dc3f0f2a36f2c6f52bb3713a2550c7deff1e4ec25152dd67cdfc54f17f662ac099a96e20972e67c00791b30d74f57dafd4c080d2e834502b22"}, {0x38, 0x11e, 0x4, "d312781bfc93ba0c3c0ecb8e3dea4a17c2772176ce08f89c67638e18db57ef6fcc6425"}, {0xb8, 0x109, 0x9, "cfb54477ccb4b9d82928ee50756b5f9441eca84e76b61345d831f52ad62f766f4c317a5a6f5a8b26460a3f290d5a13b395cd7236331e707aa04c96f7eae088084696a4d1a3b1cc8bffb79a5fb28ed01753ef6c934709bccfbcdf33cc450a9a292128c85e7f36991d37956f7e600594472213e80860309b22c66887a6d491df5012c35f98ff9b550c88540e3c297f992fb33e6807155505bbb5a6c3fb1cbc30c234fea4"}, {0xb8, 0x13a, 0x0, "430289f7e733464a23b2052a24688b710120ee11f47a67aaaf7eaf61b7991fc01a4cd8280d5244b801101e56f9677ed7ab3a6965c34709e9c8ec79956989240c2f2cd873230200cc247403b760d48135ed96acedd8a7ddbac7d38bcda8957c1862b9480db8339adf00c41f288a56f4e9db359906764035d19cdfd6baa948d609c57dcd43a5069258bf71630da147b2f40dba2bf89a5280468f29517bebc0b74305a672fd80b8"}, {0x108, 0x119, 0x5, "31798b33b76feabc9d09fbb9f93436d8bc077ae1ef50d4b694037dee7a4b2f932002ad6548c079b34eee89350f3b41bb65e60c917800708d06765c8fa2a9c9a2eaf6dd9de363d8444fd38c91ca5844746ddaab71ca49f74e3a2db3183cfe90b81c5bcbe7fc6c4757a00daf2fb7ed814143a8d04d6bff2e638defdaef3a3ad011d282f5cf80cc52f588819247c073108a887a798ffa39cfdff49fead08ed9eceb2f4b27367455de34f27157a8df3bacf586401a0d6fd5457ace653edb1c8bf9c8377ac9e0a068ea0b2331e8177e19a66b84a7d9294a52adec997391c6e556a2980267185b677eb4ce8e7a5ba909ab400ce9111a6867b6a5"}], 0x1630, 0x80}, 0x40) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x80000001, 0x9000000000000, 0x3, 0x0, r1, 0xfffffffffffffffc}, 0x2c) recvmsg(r4, &(0x7f0000000680)={&(0x7f0000000180)=@hci={0x0, 0x0}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000440)=""/254, 0xfe}, {&(0x7f0000000540)=""/123, 0x7b}, {&(0x7f00000005c0)=""/73, 0x49}], 0x3, &(0x7f0000000640)=""/1, 0x1, 0x2b1ba5150000}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x5, &(0x7f0000000e80)=ANY=[@ANYBLOB="18000000250c000000000000004f0000181f0000", @ANYRES32=r4, @ANYBLOB="00000000000000009500000000000000744d6db164f78b70cb2bbaeb6d381d22daa94f"], &(0x7f0000000100)='GPL\x00', 0x1, 0x22, &(0x7f0000000140)=""/34, 0x41000, 0x1, [], r5}, 0x48) 2018/03/30 22:45:26 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x20000000) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x4, &(0x7f00000003c0)=@raw=[@jmp={0x5, 0x401, 0x0, 0x2, 0x8}, @exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x0, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) mkdir(&(0x7f0000000ac0)='./file1\x00', 0x40) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000640)='./file1\x00', 0x1) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x103fe, &(0x7f0000444000)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000003c40)={&(0x7f0000001500)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000001580)=""/187, 0xbb}, {&(0x7f0000001640)=""/202, 0xca}, {&(0x7f0000001740)=""/97, 0x61}, {&(0x7f0000003b40)=""/111, 0x6f}], 0x4, 0x0, 0x0, 0x800}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000003c80)={0x0, 0x9, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@generic={0x10001, 0x9, 0x10001, 0x3}, @ldst={0x3, 0x3, 0x7, 0x3, 0x8, 0x0, 0x8}, @generic={0x0, 0x1ff, 0x623c7a4d, 0x6006730a}], {0x95}}, &(0x7f0000000980)='GPL\x00', 0x5, 0x84, &(0x7f00000009c0)=""/132, 0x41f00, 0x1, [], r0}, 0x48) mkdir(&(0x7f0000000a80)='./file0\x00', 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r1, 0x7da4b2b, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0x12, &(0x7f00000004c0)=@raw=[@exit={0x95}, @jmp={0x5, 0x7f, 0x9, 0x7, 0x0, 0x30, 0x570c72d2c4205df9}, @generic={0x401, 0xffffffffffffffc1, 0x8, 0x1}, @call={0x85, 0x0, 0x0, 0x38}, @ldst={0x1, 0x2, 0x34194f12a387f72c, 0x2, 0x3, 0xfffffffc, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x18}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10001}, @call={0x85, 0x0, 0x0, 0x33}], &(0x7f0000000380)='syzkaller\x00', 0x7fff, 0xd, &(0x7f0000000580)=""/13, 0x40f00, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000000e40)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000c80)=""/21, 0x15}, {&(0x7f0000000ec0)=""/105, 0x69}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/5, 0x5}, {&(0x7f0000001040)=""/15, 0xf}, {&(0x7f0000001080)=""/204, 0xcc}], 0x6, &(0x7f0000001200)=""/43, 0x2b, 0x6}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0xf, 0xb, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0xffffffffffffff00}, [@ldst={0x3, 0x0, 0x6, 0xf, 0x7, 0xfffffff8, 0xfffffffffffffff0}, @exit={0x95}, @jmp={0x5, 0x8, 0x7, 0xf, 0x1, 0xfffffffe, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}], {0x95}}, &(0x7f0000000680)='syzkaller\x00', 0x304f, 0x41, &(0x7f0000000880)=""/65, 0x41100, 0x1, [], r2}, 0x48) 2018/03/30 22:45:26 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:26 executing program 1 (fault-call:19 fault-nth:61): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:26 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000400)=@rc={0x1f}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000540)=[{0x18, 0x1, 0x1, "d9"}], 0x18}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r0, 0x50, &(0x7f0000000080)}, 0xffffffffffffff5a) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x6, 0x20, 0x88, 0x5, 0x0, 0x8, 0x1000, 0x2, 0x7, 0x4, 0x5, 0x4, 0xc163, 0x6, 0xd08, 0x5, 0x1000, 0x3, 0x7, 0x4, 0x100000001, 0x5, 0x7d, 0x8, 0x3, 0x7, 0x7, 0x0, 0x9, 0x5, 0x9, 0x101, 0x2, 0x100000001, 0x21, 0x2, 0x0, 0xdae, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x4, 0x7fffffff, 0x7f, 0x2, 0x80, 0x3, 0x7}, r2, 0xc, r1, 0x8) [ 2644.086869] devpts: called with bogus options [ 2644.094379] devpts: called with bogus options [ 2644.096992] devpts: called with bogus options [ 2644.131873] FAULT_INJECTION: forcing a failure. [ 2644.131873] name failslab, interval 1, probability 0, space 0, times 0 [ 2644.143200] CPU: 1 PID: 5393 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2644.150393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2644.159853] Call Trace: [ 2644.162448] dump_stack+0x194/0x24d [ 2644.166167] ? arch_local_irq_restore+0x53/0x53 [ 2644.170833] should_fail+0x8c0/0xa40 [ 2644.174530] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2644.179617] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2644.184787] ? __lock_acquire+0x664/0x3e00 [ 2644.189001] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2644.194184] ? find_held_lock+0x35/0x1d0 [ 2644.198230] ? __lock_is_held+0xb6/0x140 [ 2644.202282] ? check_same_owner+0x320/0x320 [ 2644.206585] ? __d_lookup+0x4f4/0x830 [ 2644.210370] ? rcu_note_context_switch+0x710/0x710 [ 2644.215284] should_failslab+0xec/0x120 [ 2644.219259] kmem_cache_alloc+0x47/0x760 [ 2644.223313] __d_alloc+0xc1/0xbd0 [ 2644.226748] ? shrink_dcache_for_umount+0x290/0x290 [ 2644.231747] ? d_alloc_parallel+0x1b40/0x1b40 [ 2644.236251] ? lock_release+0xa40/0xa40 [ 2644.240214] ? mark_held_locks+0xaf/0x100 [ 2644.244342] ? d_lookup+0x133/0x2e0 [ 2644.247952] ? d_lookup+0x1d5/0x2e0 [ 2644.251562] d_alloc+0x8e/0x340 [ 2644.254822] ? __d_alloc+0xbd0/0xbd0 [ 2644.258515] ? full_name_hash+0x9b/0xe0 [ 2644.262490] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2644.267748] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2644.271971] rpc_populate.constprop.15+0xa3/0x340 [ 2644.276800] rpc_fill_super+0x379/0xae0 [ 2644.280757] ? cap_capable+0x1b5/0x230 [ 2644.284627] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2644.289799] ? security_capable+0x8e/0xc0 [ 2644.293929] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2644.299097] ? ns_capable_common+0xcf/0x160 [ 2644.303401] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2644.308571] mount_ns+0xc4/0x190 [ 2644.311921] rpc_mount+0x9e/0xd0 [ 2644.315271] mount_fs+0x66/0x2d0 [ 2644.318622] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2644.323188] ? may_umount+0xa0/0xa0 [ 2644.326797] ? _raw_read_unlock+0x22/0x30 [ 2644.330929] ? __get_fs_type+0x8a/0xc0 [ 2644.334800] do_mount+0xea4/0x2bb0 [ 2644.338321] ? __might_fault+0x110/0x1d0 [ 2644.342365] ? copy_mount_string+0x40/0x40 [ 2644.346580] ? check_same_owner+0x320/0x320 [ 2644.350883] ? __check_object_size+0x8b/0x530 [ 2644.355362] ? __might_sleep+0x95/0x190 [ 2644.360020] ? kasan_check_write+0x14/0x20 [ 2644.364244] ? _copy_from_user+0x99/0x110 [ 2644.368380] ? memdup_user+0x5e/0x90 [ 2644.372073] ? copy_mount_options+0x1f7/0x2e0 [ 2644.376553] SyS_mount+0xab/0x120 [ 2644.379985] ? copy_mnt_ns+0xb30/0xb30 [ 2644.383854] do_syscall_64+0x281/0x940 [ 2644.387721] ? vmalloc_sync_all+0x30/0x30 [ 2644.391848] ? _raw_spin_unlock_irq+0x27/0x70 [ 2644.396322] ? finish_task_switch+0x1c1/0x7e0 [ 2644.400798] ? syscall_return_slowpath+0x550/0x550 [ 2644.405706] ? syscall_return_slowpath+0x2ac/0x550 [ 2644.410621] ? prepare_exit_to_usermode+0x350/0x350 [ 2644.415619] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2644.420966] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2644.425791] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/30 22:45:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0xf, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xf, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 2018/03/30 22:45:27 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2644.430961] RIP: 0033:0x454e79 [ 2644.434128] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2644.441819] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2644.449067] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2644.456316] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2644.463564] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2644.470815] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003d 2018/03/30 22:45:27 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x0, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:27 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2644.543230] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 22:45:27 executing program 1 (fault-call:19 fault-nth:62): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:27 executing program 2: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x401) r0 = perf_event_open(&(0x7f0000000080)={0x28766e5991ea720, 0x70, 0x3, 0x8, 0xfffffffffffffffc, 0x100000001, 0x0, 0x9, 0x5080, 0x7, 0x3b665d32, 0xffffffff, 0x8, 0x5, 0xfffffffffffffffa, 0x0, 0xcd, 0x91f3, 0x7, 0xffff, 0x1ff, 0xff8, 0x2dde, 0x5, 0x101, 0x200, 0xfffffffffffffffe, 0x6, 0x9, 0x1f, 0x8, 0xfffffffffffffffc, 0xfffffffffffffff9, 0x8, 0x2, 0x1ff, 0x10000, 0x7, 0x0, 0x40, 0x2, @perf_config_ext={0x3, 0x6}, 0x0, 0x100, 0x8, 0x4, 0x55, 0x1, 0x3}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 2018/03/30 22:45:27 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000840)={r3}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r4 = getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x8, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r4, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb1104058d8843") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r5, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000540)={r5}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r5}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(r8, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x2}, 0x40) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) [ 2644.590944] devpts: called with bogus options [ 2644.598690] EXT4-fs (sda1): re-mounted. Opts: [ 2644.607819] devpts: called with bogus options [ 2644.622158] devpts: called with bogus options 2018/03/30 22:45:27 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2644.670106] EXT4-fs (sda1): re-mounted. Opts: 2018/03/30 22:45:27 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:27 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x0, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:27 executing program 0: perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x4, 0x0, 0x9, 0x80000000, 0x0, 0x1, 0x20000, 0x8, 0x1, 0x2, 0x6, 0x3, 0x4, 0x2a8, 0x5, 0x7ff, 0x5, 0x4, 0x0, 0xb58, 0x800, 0x65, 0x1, 0x80000000, 0xfffffffffffffffb, 0x7, 0x1ff, 0x10000, 0x0, 0x1, 0x7ff, 0x1, 0x9, 0x5, 0x0, 0x7, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x2000, 0x8, 0x8, 0x7, 0x20, 0x3f, 0xa6}, 0x0, 0xb, 0xffffffffffffff9c, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x8, 0x4, 0x9, 0xfffffffffffffffa, 0x0, 0x8000, 0x4009, 0x5, 0x100000000, 0xff, 0x80000001, 0x3ff, 0x81, 0x7, 0x4ef, 0x2, 0x200000, 0x8, 0x8, 0x800, 0xfb06000000, 0x81, 0x9, 0x0, 0x0, 0xd65b, 0x8, 0x6, 0x4, 0x1, 0x40, 0x1, 0x5, 0xff, 0x80000000, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x10001, 0x400, 0x7, 0x80, 0x3, 0x5}, 0x0, 0x3, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xc, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000ff0000000002800000850000002700000005000000000000009500000000000000"], &(0x7f00000000c0)="00007bf056c718041899f95b1a", 0x1, 0xce, &(0x7f0000000100)=""/206}, 0x48) 2018/03/30 22:45:27 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x1) socketpair(0x0, 0x80006, 0x7, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x0, 0x100, 0x80, 0x6, 0x0, 0x0, 0x84, 0x0, 0x3, 0x3, 0x3, 0x1, 0x6, 0x5, 0x7, 0x7, 0x80, 0x7, 0x1, 0x88, 0x8001, 0x5, 0x1, 0xf492, 0x7ff, 0x3f, 0x6, 0xe, 0xe400000000000000, 0xf60a, 0x6, 0xfcfa, 0x100000001, 0x4, 0x8001, 0x2, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000540), 0x4}, 0x408, 0x6, 0x5, 0x5, 0x800, 0x7, 0x4}, r0, 0x10, r1, 0x0) recvmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000100)=""/63, 0x3f, 0xfffffffffffffffc}, 0xfffffffffffffffe) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={0xffffffffffffffff, &(0x7f0000000280)="dc0082022d94423b2cbd337125b47363e747390ac081835857ce88b8ed90fd71687bd6ecdd71d9a42055be7a3f0ccbc4e301cff2b9d2ff6dd8568636f52c4ffc670e73f9eb46c9d9bc93a94238c481690acc0b09020a427cddaae7a7830e79b5cb5c090d5a0535c6d291786c11cea3ae1a4a1d2e67efafae34b77a858dbe13c166ec07406acbdb490d968216f7cad8ae01829fbcefeaca0245fd90606658153d38473d8836cf58443c8c04b4a463b690f73df7273d268010e23057a38bfe026860208643db92bdaf0877ba6bb112069dc9c96b27984201971d19f06896933cd291", &(0x7f0000000380)=""/199}, 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000200)=0x9) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) socketpair(0x10, 0x800, 0x5, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x805, 0x0, &(0x7f0000002480)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003680)={&(0x7f0000002340)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000003540)=[{&(0x7f0000002540)=""/4096, 0x1000}], 0x1, &(0x7f0000003580)=""/227, 0xe3}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003a40)={&(0x7f00000037c0)=@sco={0x1f, {0x0, 0x0, 0x0, 0x7ff}}, 0x80, &(0x7f0000003a00)=[{&(0x7f0000003840)}], 0x1}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000003a80)) bpf$PROG_LOAD(0x5, &(0x7f0000003f00)={0x0, 0x2, &(0x7f0000003dc0)=@raw=[@exit={0x95}], &(0x7f0000003e00)='GPL\x00', 0xee2, 0xaf, &(0x7f0000003e40)=""/175, 0x40f00}, 0x48) perf_event_open(&(0x7f0000001340)={0x7, 0x70, 0xfffffffffffffff9, 0x9, 0x5, 0xff, 0x0, 0x7fff, 0x0, 0x0, 0x3, 0x6, 0x457, 0x3, 0x5, 0x3, 0x9, 0x0, 0x40, 0x1, 0x1dc, 0x2, 0x1, 0x8001, 0x1, 0x0, 0x0, 0x4, 0x0, 0xff, 0x9, 0x7fff, 0x100000000, 0x8, 0x7, 0x6ad, 0xffffffffffffff14, 0x9, 0x0, 0x39, 0x4, @perf_config_ext={0x6, 0x80000000}, 0x400, 0xfffffffffffffff8, 0xffffffffffffff81, 0x3, 0x2, 0x6, 0xb75}, 0x0, 0x7, r5, 0x8) recvmsg$kcm(r3, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000800)=""/131, 0x83}], 0x1, &(0x7f0000001240)=""/134, 0x86, 0xfff}, 0x2000) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000680)) socketpair(0x2, 0x80003, 0x8000, &(0x7f0000000600)) mkdir(&(0x7f0000002700)='./file2\x00', 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002680)={&(0x7f0000002640)='./file1\x00', 0x0, 0x8}, 0x10) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000004c0)) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000a3bff8)='./file0\x00', &(0x7f00000026c0)='nfs4\x00', 0x0, &(0x7f000000a000)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000640)=0xb3) 2018/03/30 22:45:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x4, 0x4, 0x4, 0xc}, 0x2c) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) socketpair(0x10, 0x0, 0x8, &(0x7f0000000040)) [ 2644.786933] xprt_adjust_timeout: rq_timeout = 0! [ 2644.851467] FAULT_INJECTION: forcing a failure. [ 2644.851467] name failslab, interval 1, probability 0, space 0, times 0 [ 2644.862882] CPU: 1 PID: 5442 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2644.870076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2644.879436] Call Trace: [ 2644.882038] dump_stack+0x194/0x24d [ 2644.885683] ? arch_local_irq_restore+0x53/0x53 [ 2644.890374] should_fail+0x8c0/0xa40 [ 2644.894110] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 2644.899152] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2644.904254] ? perf_trace_lock+0x900/0x900 [ 2644.908487] ? __lock_acquire+0x664/0x3e00 [ 2644.912719] ? find_held_lock+0x35/0x1d0 [ 2644.916769] ? __lock_is_held+0xb6/0x140 [ 2644.920822] ? check_same_owner+0x320/0x320 [ 2644.925125] ? __d_lookup+0x4f4/0x830 [ 2644.928914] ? rcu_note_context_switch+0x710/0x710 [ 2644.933834] should_failslab+0xec/0x120 [ 2644.937793] kmem_cache_alloc+0x47/0x760 [ 2644.941843] __d_alloc+0xc1/0xbd0 [ 2644.945282] ? shrink_dcache_for_umount+0x290/0x290 [ 2644.950377] ? d_alloc_parallel+0x1b40/0x1b40 [ 2644.954855] ? lock_release+0xa40/0xa40 [ 2644.958815] ? mark_held_locks+0xaf/0x100 [ 2644.962949] ? d_lookup+0x133/0x2e0 [ 2644.966562] ? d_lookup+0x1d5/0x2e0 [ 2644.970171] d_alloc+0x8e/0x340 [ 2644.973433] ? __d_alloc+0xbd0/0xbd0 [ 2644.977130] ? full_name_hash+0x9b/0xe0 [ 2644.981098] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2644.986359] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2644.990590] rpc_populate.constprop.15+0xa3/0x340 [ 2644.995425] rpc_fill_super+0x379/0xae0 [ 2644.999383] ? cap_capable+0x1b5/0x230 [ 2645.003252] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2645.008426] ? security_capable+0x8e/0xc0 [ 2645.012561] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2645.017731] ? ns_capable_common+0xcf/0x160 [ 2645.022041] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2645.027219] mount_ns+0xc4/0x190 [ 2645.030568] rpc_mount+0x9e/0xd0 [ 2645.034006] mount_fs+0x66/0x2d0 [ 2645.037365] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2645.041929] ? may_umount+0xa0/0xa0 [ 2645.045536] ? _raw_read_unlock+0x22/0x30 [ 2645.049663] ? __get_fs_type+0x8a/0xc0 [ 2645.053535] do_mount+0xea4/0x2bb0 [ 2645.057056] ? __might_fault+0x110/0x1d0 [ 2645.061198] ? copy_mount_string+0x40/0x40 [ 2645.065418] ? __check_object_size+0x8b/0x530 [ 2645.069907] ? __might_sleep+0x95/0x190 [ 2645.073871] ? kasan_check_write+0x14/0x20 [ 2645.078088] ? _copy_from_user+0x99/0x110 [ 2645.082221] ? memdup_user+0x5e/0x90 [ 2645.085916] ? copy_mount_options+0x1f7/0x2e0 [ 2645.090395] SyS_mount+0xab/0x120 [ 2645.093840] ? copy_mnt_ns+0xb30/0xb30 [ 2645.097710] do_syscall_64+0x281/0x940 [ 2645.101580] ? vmalloc_sync_all+0x30/0x30 [ 2645.105709] ? _raw_spin_unlock_irq+0x27/0x70 [ 2645.110188] ? finish_task_switch+0x1c1/0x7e0 [ 2645.114665] ? syscall_return_slowpath+0x550/0x550 [ 2645.119577] ? syscall_return_slowpath+0x2ac/0x550 [ 2645.124488] ? prepare_exit_to_usermode+0x350/0x350 [ 2645.129485] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2645.135268] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2645.140100] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2645.145268] RIP: 0033:0x454e79 [ 2645.148440] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2645.156131] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2645.163381] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2645.170629] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2645.177878] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2645.185127] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003e [ 2645.210976] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 2645.223990] devpts: called with bogus options [ 2645.246952] devpts: called with bogus options [ 2645.258117] devpts: called with bogus options 2018/03/30 22:45:28 executing program 1 (fault-call:19 fault-nth:63): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:28 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x0, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:28 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) mount(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)='./file0/file1\x00', &(0x7f0000000400)='jffs2\x00', 0x4000, 0x0) sendmsg$kcm(r1, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000001a00)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r2, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r3, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r6 = gettid() r7 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r6, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r5, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r5}, 0xb) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x0, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x0, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r6, 0xd, r7, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/30 22:45:28 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00'}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r4, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, r0, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0x9, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x3, 0x1, 0x0, 0xfffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r7}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r8}, 0x10) close(r5) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/30 22:45:28 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x0, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2645.454249] FAULT_INJECTION: forcing a failure. [ 2645.454249] name failslab, interval 1, probability 0, space 0, times 0 [ 2645.465715] CPU: 1 PID: 5477 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2645.472914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2645.482278] Call Trace: [ 2645.484882] dump_stack+0x194/0x24d [ 2645.488524] ? arch_local_irq_restore+0x53/0x53 [ 2645.493215] should_fail+0x8c0/0xa40 [ 2645.496941] ? perf_trace_lock_acquire+0xe3/0x980 [ 2645.501805] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2645.502567] devpts: called with bogus options [ 2645.506917] ? trace_event_raw_event_lock+0x340/0x340 [ 2645.506931] ? perf_trace_lock+0x900/0x900 [ 2645.506944] ? mark_held_locks+0xaf/0x100 [ 2645.506961] ? __raw_spin_lock_init+0x1c/0x100 [ 2645.528485] devpts: called with bogus options [ 2645.529567] ? find_held_lock+0x35/0x1d0 [ 2645.529587] ? __lock_is_held+0xb6/0x140 [ 2645.529612] ? check_same_owner+0x320/0x320 [ 2645.529623] ? d_alloc+0x269/0x340 [ 2645.529635] ? rcu_note_context_switch+0x710/0x710 [ 2645.529650] should_failslab+0xec/0x120 [ 2645.558946] kmem_cache_alloc+0x47/0x760 [ 2645.563015] ? d_drop+0x51/0x60 [ 2645.566303] ? rpc_i_callback+0x30/0x30 [ 2645.570283] rpc_alloc_inode+0x1a/0x20 [ 2645.574170] alloc_inode+0x65/0x180 [ 2645.577799] new_inode_pseudo+0x69/0x190 [ 2645.581864] ? prune_icache_sb+0x1a0/0x1a0 [ 2645.586102] ? do_raw_spin_trylock+0x190/0x190 [ 2645.590689] ? d_add+0xa70/0xa70 [ 2645.594070] new_inode+0x1c/0x40 [ 2645.597445] rpc_get_inode+0x20/0x1e0 [ 2645.601256] __rpc_create_common+0x5d/0x1d0 [ 2645.605590] rpc_populate.constprop.15+0x1ad/0x340 [ 2645.610535] rpc_fill_super+0x379/0xae0 [ 2645.614519] ? cap_capable+0x1b5/0x230 [ 2645.618415] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2645.623614] ? security_capable+0x8e/0xc0 [ 2645.627782] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2645.632988] ? ns_capable_common+0xcf/0x160 [ 2645.637316] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2645.642510] mount_ns+0xc4/0x190 [ 2645.645885] rpc_mount+0x9e/0xd0 [ 2645.649251] mount_fs+0x66/0x2d0 [ 2645.652615] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2645.657195] ? may_umount+0xa0/0xa0 [ 2645.660820] ? _raw_read_unlock+0x22/0x30 [ 2645.664964] ? __get_fs_type+0x8a/0xc0 [ 2645.668858] do_mount+0xea4/0x2bb0 [ 2645.672401] ? __might_fault+0x110/0x1d0 [ 2645.676469] ? copy_mount_string+0x40/0x40 [ 2645.680709] ? __check_object_size+0x8b/0x530 [ 2645.685214] ? __might_sleep+0x95/0x190 [ 2645.689209] ? kasan_check_write+0x14/0x20 [ 2645.693454] ? _copy_from_user+0x99/0x110 [ 2645.697608] ? memdup_user+0x5e/0x90 [ 2645.701321] ? copy_mount_options+0x1f7/0x2e0 [ 2645.705820] SyS_mount+0xab/0x120 [ 2645.709272] ? copy_mnt_ns+0xb30/0xb30 [ 2645.713158] do_syscall_64+0x281/0x940 [ 2645.717032] ? vmalloc_sync_all+0x30/0x30 [ 2645.721165] ? _raw_spin_unlock_irq+0x27/0x70 [ 2645.725647] ? finish_task_switch+0x1c1/0x7e0 [ 2645.730125] ? syscall_return_slowpath+0x550/0x550 [ 2645.735038] ? syscall_return_slowpath+0x2ac/0x550 [ 2645.739948] ? prepare_exit_to_usermode+0x350/0x350 [ 2645.744944] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2645.750290] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2645.755115] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2645.760282] RIP: 0033:0x454e79 [ 2645.763449] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2645.771134] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2645.778380] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2645.785629] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2645.792875] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2645.800120] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000003f [ 2645.807640] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfs [ 2645.824638] devpts: called with bogus options [ 2645.914836] xprt_adjust_timeout: rq_timeout = 0! [ 2645.928697] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 2645.954842] hugetlbfs: Bad mount option: "" [ 2646.012567] devpts: called with bogus options [ 2646.040495] hugetlbfs: Bad mount option: "" 2018/03/30 22:45:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:29 executing program 0: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount(&(0x7f0000000880)='./file0/file0\x00', &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='aio\x00', 0x2, &(0x7f0000000940)="e401017d3fafeb442b9ff2399be60ddc1afc2ef27c9a30b29c21653350b158ef4ff059f4125811f801084dda8165a94945867a5910bcc27e2382a89a60472dfcc6f4be44ca555b23ffa0e5c78c5f4758446d4c8ac10dd59162d60d726c6ec7f5ee8cb8fe253ceee2566ce5eaa69621cbe1ae434e03c42a5d72c6cfe721aafd1c4ae387236691aaa31cb5aad6bb0f57438b4c3c58335a7c5672f936014a03fb17ccdb30020154306981eb6c1fdd9c825ba8d185d5cccc4dad88377d254cca3d9d9e6bd8096905244e633f3f9e5f22cb57426aa66f518ca7de9bb7bc667ec3fa1925cd795e2cb6550734bc695ca163f29c") mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='cgroup2\x00', 0x208000, &(0x7f0000000440)="4295ea6fd2c7473a2a8a10c6f02fac2441cc93f496908a7917d7065e8f0152bc59525b524624c19b74906e4b891238bf79c132e449c678c26e5a23a94ae98447ca068d1c367fc6c03f2a7721dfd77a282fdd9134f672d46c51f231a687fd412ecbf1686d95bef3db0082bc7e2296dc1af0aa9249bbc72c0d1d100025") mkdir(&(0x7f0000000080)='./file0\x00', 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xf, 0xa, &(0x7f0000000680)=@raw=[@jmp={0x5, 0x0, 0xc, 0x1, 0x6, 0xfffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0xe4}, @exit={0x95}, @generic={0xffffffff, 0x1, 0x9, 0x800}, @map={0x18, 0x6, 0x1, 0x0, 0xffffffffffffff9c}], &(0x7f0000000700)='GPL\x00', 0x0, 0x51, &(0x7f0000000740)=""/81, 0x0, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000840)={&(0x7f0000000640)='./file0/file0\x00', r0}, 0x10) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='pipefs\x00', 0x2, &(0x7f0000000200)="1cbf5bbb79964b1303dbdabb73999d36dc0c406911bffcc9f0595ad1861f923be4dc300fa9110797cce35dd0fbc076f2e697a2646562cf31f353af59910dc52ddbbe2a386f810596c913c888eb795b04d4553a9c434f53a209a78e4418ae34ca489e2e23453d4103ddb5bd75cb6bdcece6f97fa6d58bba8cdbd30526dd2ee58d37dca5f045e69caebf4a027ce140a6ad2b2cf2f9443c40b2679aef3fe8cbb49861a8401c61185d5871eea3c2d4883459c6a4cb6cd5a215ffecf4df") mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='securityfs\x00', 0x4, &(0x7f0000000540)="4c1c1f5f86766dd8172a5b0ffcc963213e08a1479580a4593121b07525766fccc7b4b252b79ae2367b8229b960c3d02e4e8f0f55049122b9988864311a50b41700c5d29b6041208c0c52d0ff5435b9ab6016d88a6fb04aecdafa3a62c216bc5acd1ab19dd5a02db0") mkdir(&(0x7f0000000340)='./file0/file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00', 0x0, 0x8}, 0x10) 2018/03/30 22:45:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x0, &(0x7f00000001c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1}, 0x0) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000640)='./file0\x00', 0x0, 0x18}, 0x10) socketpair(0x0, 0xa, 0x100000000, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x8, 0xc, &(0x7f0000000800)=@raw=[@alu={0x4, 0x81, 0xe, 0xe, 0xa, 0x51, 0xfffffffffffffffc}, @jmp={0x5, 0x2, 0xd, 0x9, 0x8, 0xfffffffc, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x10001}, @call={0x85, 0x0, 0x0, 0x6}, @map={0x18, 0x7, 0x1, 0x0, r6}, @map={0x18, 0x8, 0x1, 0x0, r7}], &(0x7f0000000780)='GPL\x00', 0x9050, 0x9d, &(0x7f0000000980)=""/157, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000580)=@vsock, 0xfffffffffffffd4b, &(0x7f0000000600)=[{&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f00000004c0)=""/133, 0x85}], 0x2, &(0x7f0000000a40)=""/140, 0x71, 0xf6}, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) 2018/03/30 22:45:29 executing program 3: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, r0, 0x4, 0x1}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x15, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x2c) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000004000)={&(0x7f0000002bc0)=@can={0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f0000002c40)=""/4096, 0x1000}, {&(0x7f0000003c40)=""/114, 0x72}, {&(0x7f0000003cc0)=""/113, 0x71}, {&(0x7f0000003d40)=""/150, 0x96}, {&(0x7f0000003e00)=""/125, 0x7d}], 0x5, &(0x7f0000003f00)=""/211, 0xd3, 0x960}, 0x21) bpf$PROG_LOAD(0x5, &(0x7f0000004040)={0x0, 0xa, &(0x7f0000000000)=@raw=[@exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1d9, 0x0, 0x0, 0x0, 0x1}, @ldst={0x1, 0x1, 0x6, 0xa, 0x3, 0x1, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffff}, @alu={0x4, 0x4, 0xf, 0xe, 0x36dc08afd9379cda, 0xfffffffc, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x7, 0x2a, &(0x7f00000000c0)=""/42, 0x41100, 0x1, [], r1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0xffffffd5, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 2018/03/30 22:45:29 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:29 executing program 1 (fault-call:19 fault-nth:64): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:29 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='vfat\x00', 0x1100000, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x11) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000200)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)="8f7063002efb12", 0x0, &(0x7f0000000500)="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") mkdir(&(0x7f00000003c0)='./file0/file0\x00', 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f00000001c0)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000000400)='./file1\x00', 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) getpid() 2018/03/30 22:45:29 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:29 executing program 3: socketpair(0x11, 0x80803, 0x10, &(0x7f0000000000)) [ 2646.153924] cgroup: cgroup2: unknown option "B•êoÒÇG:*ŠÆð/¬$AÌ“ô–Šy×^R¼YR[RF$Á›tnK‰8¿yÁ2äIÆxÂnZ#©Jé„GÊ6ÆÀ?*w!ß×z(/Ý‘4örÔlQò1¦‡ýA.Ëñhm•¾óÛ" [ 2646.161471] devpts: called with bogus options [ 2646.187445] devpts: called with bogus options [ 2646.188922] devpts: called with bogus options [ 2646.206172] FAULT_INJECTION: forcing a failure. [ 2646.206172] name failslab, interval 1, probability 0, space 0, times 0 [ 2646.217521] CPU: 1 PID: 5529 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2646.224715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2646.232734] cgroup: cgroup2: unknown option "B•êoÒÇG:*ŠÆð/¬$AÌ“ô–Šy×^R¼YR[RF$Á›tnK‰8¿yÁ2äIÆxÂnZ#©Jé„GÊ6ÆÀ?*w!ß×z(/Ý‘4örÔlQò1¦‡ýA.Ëñhm•¾óÛ" [ 2646.234064] Call Trace: [ 2646.234083] dump_stack+0x194/0x24d 2018/03/30 22:45:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:29 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2646.234099] ? arch_local_irq_restore+0x53/0x53 [ 2646.234119] should_fail+0x8c0/0xa40 [ 2646.234129] ? perf_trace_lock_acquire+0xe3/0x980 [ 2646.234143] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2646.272268] ? perf_trace_lock+0x900/0x900 [ 2646.276508] ? mark_held_locks+0xaf/0x100 [ 2646.280655] ? __raw_spin_lock_init+0x1c/0x100 [ 2646.285236] ? find_held_lock+0x35/0x1d0 [ 2646.289299] ? __lock_is_held+0xb6/0x140 [ 2646.293376] ? check_same_owner+0x320/0x320 [ 2646.297702] ? d_alloc+0x269/0x340 [ 2646.301247] ? rcu_note_context_switch+0x710/0x710 2018/03/30 22:45:29 executing program 0: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(r0, &(0x7f0000000c80)={&(0x7f0000000d00)=@hci, 0x80, &(0x7f0000000b80)=[{&(0x7f00000000c0)=""/12, 0xc}], 0x1, &(0x7f0000000d80)=""/169, 0xa9, 0x10000}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b40)={r2, 0x0, 0xb4, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2b", &(0x7f0000000340)=""/90, 0x2, 0x932a}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000a80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000cc0)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000e40)=0xfc) getpid() ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r6, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) mount(&(0x7f0000000ec0)='./file0/bus\x00', &(0x7f0000000f00)='./file0/bus\x00', &(0x7f0000000f40)='hostfs\x00', 0x41, &(0x7f0000001080)="6af2d2b1efcdc778acf34bf231a368266c3c466195513b20193836cbee1fef57b0eaf2b74edeb4d8e440933d67f28191836a3f5012a7e7102f0c6723afce665941f02c32d579acedbae4b8f7b102d85d7d8778e784429ae8992ad033a618bbc4a80b3ad4f03df6b3013fddfa3eed60ab17172a57a7badcdeaa01ac450fd34fe947657cbf692a2f1ea3dfe9996c6385b99f32a5968aacf1954f2af603d34deadc87c0058f59b3c4999ddf112e450ac962235d85cfa5873e948f9f18c67b30") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r6, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) [ 2646.306181] should_failslab+0xec/0x120 [ 2646.310160] kmem_cache_alloc+0x47/0x760 [ 2646.314226] ? d_drop+0x51/0x60 [ 2646.317505] ? rpc_i_callback+0x30/0x30 [ 2646.321658] rpc_alloc_inode+0x1a/0x20 [ 2646.325549] alloc_inode+0x65/0x180 [ 2646.329184] new_inode_pseudo+0x69/0x190 [ 2646.333253] ? prune_icache_sb+0x1a0/0x1a0 [ 2646.337494] ? do_raw_spin_trylock+0x190/0x190 [ 2646.342085] ? d_add+0xa70/0xa70 [ 2646.345457] new_inode+0x1c/0x40 [ 2646.348831] rpc_get_inode+0x20/0x1e0 [ 2646.352638] __rpc_create_common+0x5d/0x1d0 [ 2646.357802] rpc_populate.constprop.15+0x1ad/0x340 [ 2646.362747] rpc_fill_super+0x379/0xae0 [ 2646.366727] ? cap_capable+0x1b5/0x230 [ 2646.370619] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2646.375813] ? security_capable+0x8e/0xc0 [ 2646.379953] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2646.385138] ? ns_capable_common+0xcf/0x160 [ 2646.389449] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2646.394621] mount_ns+0xc4/0x190 [ 2646.397974] rpc_mount+0x9e/0xd0 [ 2646.401326] mount_fs+0x66/0x2d0 [ 2646.404677] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2646.409242] ? may_umount+0xa0/0xa0 [ 2646.412852] ? _raw_read_unlock+0x22/0x30 [ 2646.416988] ? __get_fs_type+0x8a/0xc0 [ 2646.420864] do_mount+0xea4/0x2bb0 [ 2646.424383] ? __might_fault+0x110/0x1d0 [ 2646.428430] ? copy_mount_string+0x40/0x40 [ 2646.432648] ? __check_object_size+0x8b/0x530 [ 2646.437131] ? __might_sleep+0x95/0x190 [ 2646.441093] ? kasan_check_write+0x14/0x20 [ 2646.445310] ? _copy_from_user+0x99/0x110 [ 2646.449449] ? memdup_user+0x5e/0x90 [ 2646.453143] ? copy_mount_options+0x1f7/0x2e0 [ 2646.457622] SyS_mount+0xab/0x120 [ 2646.461054] ? copy_mnt_ns+0xb30/0xb30 [ 2646.464925] do_syscall_64+0x281/0x940 [ 2646.468792] ? vmalloc_sync_all+0x30/0x30 [ 2646.472918] ? _raw_spin_unlock_irq+0x27/0x70 [ 2646.477394] ? finish_task_switch+0x1c1/0x7e0 [ 2646.481871] ? syscall_return_slowpath+0x550/0x550 [ 2646.486782] ? syscall_return_slowpath+0x2ac/0x550 [ 2646.491693] ? prepare_exit_to_usermode+0x350/0x350 [ 2646.496692] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2646.502045] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2646.506873] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2646.512044] RIP: 0033:0x454e79 [ 2646.515219] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2646.522908] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2646.530158] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2646.537406] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2646.544656] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/30 22:45:29 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2646.551905] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000040 [ 2646.559461] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfs [ 2646.569739] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 2646.623994] hugetlbfs: Bad mount option: "w&Õkøø{f<Ùir‡¤r³£ßD~Y»{ÁRã˜L(—¾§òš²Þ`$ÚY’Fsë7´!°JbvÈ" [ 2646.798121] devpts: called with bogus options [ 2646.805782] devpts: called with bogus options 2018/03/30 22:45:29 executing program 1 (fault-call:19 fault-nth:65): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:29 executing program 3: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xca}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="637075262d3200fbfffffffffffff6240ebfdf0368528b445ea8c4bb56a2881cf2b76ae175ef25cfcaed426b975d3765b983d239f659cb13") r1 = gettid() r2 = perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x7ff, 0x5c206cdd, 0x8, 0x8fb, 0x0, 0x1000, 0x10, 0x3, 0x800, 0x6, 0x8000, 0x0, 0x4, 0xef7d, 0x1000, 0x9, 0x100000000, 0x0, 0x6, 0x2, 0x3, 0x5, 0xffffffff, 0x1, 0xffff, 0x100000000, 0x200, 0x10001, 0x4, 0x2, 0x4, 0x9, 0x6, 0x1f, 0x2, 0x100, 0x0, 0x900, 0x2, @perf_config_ext={0x100000001, 0x7fffffff}, 0x608, 0x4, 0xfff, 0x7, 0xffffffffffff8000, 0x1, 0x2}, r1, 0x4, r0, 0x8) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000140)=ANY=[@ANYBLOB="050000000000e0fbbd428c0201180000000000000000010000df0000360eecba76cda54fcabf27206d1ed0a5d93d2710f071fb520d4937dfc35ee4d6402a936383b5329aab1965c8e60379ae4056a059ce3a5f34990e24867cf73cd0e5c919c52b2e86750c22ceff8a6caef5874f1538973e48f0e3a4791ccf12d57258c5452bc89658c2a56d168ac178c2a25dff227ad30157418bc97819f4b8edadf340a2fc004f97175d3362fe4184bdbf8786"]) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)="657468312c76626f786e657430f800") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r2, 0x28, &(0x7f0000000100)}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x1) 2018/03/30 22:45:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x3d1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001180)={r0, &(0x7f00000000c0)="e7353400ceafc3b072ee172c9ed195daf5cfd9202c937c8555e8a1acbd4c305dc78987329d7c246db6ce5d1c8535318fab262aa471a076c8b9363f80897679beaa1290881e14adabd284132f2d565d3571aaf28a70c49a4e0419344f47cdf5d32a158635456f5e5963f3adb33b3f64482fe3d33e9fcbd42a9dbe1b99bc55a452ec912a7864bde77ed5d7a1e894d661815747405919ee6fe9871d21f2bd", &(0x7f0000000180)="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", 0x2}, 0x20) recvmsg(r0, &(0x7f0000009c40)={&(0x7f0000009440)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000009a80)=[{&(0x7f00000094c0)=""/211, 0xd3}, {&(0x7f00000095c0)=""/97, 0x61}, {&(0x7f0000009640)=""/38, 0x26}, {&(0x7f0000009680)=""/188, 0xbc}, {&(0x7f0000009740)=""/158, 0x9e}, {&(0x7f0000009800)=""/31, 0x1f}, {&(0x7f0000009840)=""/213, 0xd5}, {&(0x7f0000009940)=""/196, 0xc4}, {&(0x7f0000009a40)=""/10, 0xa}], 0x9, &(0x7f0000009b40)=""/254, 0xfe, 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000009c80)={0xf, 0x5, &(0x7f00000011c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, [@map={0x18, 0x0, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000001200)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000001240)=""/4096, 0x0, 0x0, [], r1}, 0x48) 2018/03/30 22:45:29 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x0, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) r5 = gettid() perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x7, 0x6, 0x8, 0x6, 0x0, 0x9, 0x40000, 0x0, 0x3f, 0x3f, 0x0, 0x9, 0x80000000, 0x7, 0x0, 0x7, 0x17e, 0x0, 0x7f, 0x81, 0x800, 0x1, 0x9, 0x2, 0x1, 0x2, 0x517c, 0x7f, 0x0, 0x2, 0x1ff, 0x73d, 0x9, 0x3ff, 0x401, 0x7, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000200), 0x2}, 0x89, 0x8000, 0x3000, 0x0, 0x8a, 0x9, 0x98}, r5, 0x2, r4, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 22:45:29 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:29 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300), &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1b, 0x800, 0xff, &(0x7f0000000100)={0xffffffffffffffff}) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = getpid() socketpair(0x4, 0x80002, 0x2fdd, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x6, 0x3, 0x400000000000, 0x101, 0x0, 0x8, 0x44000, 0x8, 0x200, 0x6, 0x2, 0x3f, 0x3, 0x4, 0x400, 0x400, 0x4, 0xffffffffffff8001, 0x4, 0x6aa, 0x7, 0x8, 0x97, 0xebd, 0xffffffffffffffbb, 0x6, 0x8, 0x436de6f5, 0x6b, 0x3, 0x7, 0x1ff, 0x5, 0xffff, 0x3, 0x0, 0x0, 0xa3, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x141, 0x40, 0x100000, 0x7, 0x4, 0x5, 0x8}, r6, 0xe, r4, 0x8) socketpair(0x11, 0x800, 0x3, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r3, &(0x7f00000018c0)={&(0x7f00000004c0)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000540)=""/246, 0xf6}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/175, 0xaf}, {&(0x7f0000001700)=""/183, 0xb7}], 0x4, &(0x7f0000001800)=""/141, 0x8d, 0x401}, 0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r1, 0x6, 0x8}, 0xc) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001900)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000140), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='\\selfvmnet1\x00') close(r2) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001940)) gettid() setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000400), 0x4) 2018/03/30 22:45:29 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2646.970710] FAULT_INJECTION: forcing a failure. [ 2646.970710] name failslab, interval 1, probability 0, space 0, times 0 [ 2646.982085] CPU: 1 PID: 5589 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2646.989283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2646.998644] Call Trace: [ 2647.001241] dump_stack+0x194/0x24d [ 2647.004881] ? arch_local_irq_restore+0x53/0x53 [ 2647.009564] should_fail+0x8c0/0xa40 [ 2647.013296] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 2647.018327] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2647.023445] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2647.028643] ? __lock_acquire+0x664/0x3e00 [ 2647.032981] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2647.038175] ? find_held_lock+0x35/0x1d0 [ 2647.042222] ? __lock_is_held+0xb6/0x140 [ 2647.046266] ? check_same_owner+0x320/0x320 [ 2647.050564] ? __d_lookup+0x4f4/0x830 [ 2647.054342] ? rcu_note_context_switch+0x710/0x710 [ 2647.059250] should_failslab+0xec/0x120 [ 2647.063206] kmem_cache_alloc+0x47/0x760 [ 2647.067273] __d_alloc+0xc1/0xbd0 [ 2647.070707] ? shrink_dcache_for_umount+0x290/0x290 [ 2647.075704] ? d_alloc_parallel+0x1b40/0x1b40 [ 2647.080176] ? lock_release+0xa40/0xa40 [ 2647.084132] ? mark_held_locks+0xaf/0x100 [ 2647.088261] ? d_lookup+0x133/0x2e0 [ 2647.091870] ? d_lookup+0x1d5/0x2e0 [ 2647.095493] d_alloc+0x8e/0x340 [ 2647.098752] ? __d_alloc+0xbd0/0xbd0 [ 2647.102445] ? full_name_hash+0x9b/0xe0 [ 2647.106398] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2647.111649] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2647.115867] rpc_populate.constprop.15+0xa3/0x340 [ 2647.120692] rpc_fill_super+0x379/0xae0 [ 2647.124645] ? cap_capable+0x1b5/0x230 [ 2647.128509] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2647.133675] ? security_capable+0x8e/0xc0 [ 2647.137803] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2647.142970] ? ns_capable_common+0xcf/0x160 [ 2647.147267] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2647.152432] mount_ns+0xc4/0x190 [ 2647.155774] rpc_mount+0x9e/0xd0 [ 2647.159118] mount_fs+0x66/0x2d0 [ 2647.162465] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2647.167029] ? may_umount+0xa0/0xa0 [ 2647.170632] ? _raw_read_unlock+0x22/0x30 [ 2647.174757] ? __get_fs_type+0x8a/0xc0 [ 2647.178621] do_mount+0xea4/0x2bb0 [ 2647.182139] ? __might_fault+0x110/0x1d0 [ 2647.186175] ? copy_mount_string+0x40/0x40 [ 2647.190383] ? check_same_owner+0x320/0x320 [ 2647.194682] ? __check_object_size+0x8b/0x530 [ 2647.199155] ? __might_sleep+0x95/0x190 [ 2647.203112] ? kasan_check_write+0x14/0x20 [ 2647.207326] ? _copy_from_user+0x99/0x110 [ 2647.211538] ? memdup_user+0x5e/0x90 [ 2647.215227] ? copy_mount_options+0x1f7/0x2e0 [ 2647.219696] SyS_mount+0xab/0x120 [ 2647.223126] ? copy_mnt_ns+0xb30/0xb30 [ 2647.226990] do_syscall_64+0x281/0x940 [ 2647.230857] ? vmalloc_sync_all+0x30/0x30 [ 2647.234981] ? _raw_spin_unlock_irq+0x27/0x70 [ 2647.239455] ? finish_task_switch+0x1c1/0x7e0 [ 2647.243932] ? syscall_return_slowpath+0x550/0x550 [ 2647.248837] ? syscall_return_slowpath+0x2ac/0x550 [ 2647.253741] ? prepare_exit_to_usermode+0x350/0x350 [ 2647.258733] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2647.264072] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/30 22:45:30 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x8, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb1104058d8843") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000800), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000840)=r6, 0x4) sendmsg(r4, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r4, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(r5, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) recvmsg(r4, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000080000000000000000000000850000001b000000000000000000000085000000120000000000000000000000ff06ffff7c250000000000000000000018000000030000000000000000000000bf01feff080000000000000000000000d0f7fffffcffffff0000000000000000637f5e00ffffffff0000000000000000181a0000", @ANYRES32, @ANYBLOB="0000e0ff000000009500000000000000590223"], &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r7}, 0x48) [ 2647.268890] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2647.274056] RIP: 0033:0x454e79 [ 2647.277220] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2647.284904] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2647.292152] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2647.299398] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2647.306663] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2647.313914] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000041 [ 2647.355686] devpts: called with bogus options 2018/03/30 22:45:30 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x10, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2647.396251] devpts: called with bogus options 2018/03/30 22:45:30 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000480)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d811248901009d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e00896775d07e643294f42572c5c6afe73b327c265d3da17b9b836403a9848ed53b6a03675e3abe7fcbcc7f7e3e20a3247b3140d507ce0cac979cd37dc2fb7f0a6f3047c62b2b38196e9f5720f37c75293d4397af", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x400, 0xa3911f5, 0x6, 0x0, 0x80, 0x40000, 0x1, 0x240000000, 0x4, 0x2, 0x8, 0x1, 0x23, 0x8b, 0x5, 0x4, 0x2, 0x5, 0x8, 0x10000, 0x200, 0x3, 0x4, 0x40, 0xcc, 0x0, 0x7fff, 0x6, 0x9013, 0x2, 0x4, 0xe3, 0x7, 0x6, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x10, 0x5, 0x1, 0x0, 0x0, 0x7, 0x8}, 0x0, 0x2, 0xffffffffffffff9c, 0xb) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000240)=r0, 0x4) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001680)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x22, 0x1000, &(0x7f0000000100)="288b6671d7af52f647750501080089f30000000000005f2f66ad8769233d85c111af", &(0x7f0000000580)=""/4096}, 0x28) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001580)) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) 2018/03/30 22:45:30 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}, 0x0, 0xc99c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffd) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000001c0)) socketpair(0xf, 0x80a, 0x9, &(0x7f0000000200)) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='\ruser\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x29) socketpair(0x4, 0x4, 0x7f, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0x50, &(0x7f0000000080)}, 0x10) 2018/03/30 22:45:30 executing program 1 (fault-call:19 fault-nth:66): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) [ 2647.429069] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 2647.465899] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:45:30 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400), 0x0, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:30 executing program 0: socketpair(0x8, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x5, 0x63, 0x1, 0x0, 0x1, 0x80000000}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r1, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x0, 0x0, 0x0, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x0, 0x90e, 0x9, 0x0, 0x0, 0x8, 0x0, 0x0, 0x20, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000000c0)={r0}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f0000000100)=@in6={0xa, 0x4e21, 0x815, @loopback={0x0, 0x1}, 0x4}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)="55f50341e22a8308ddd2d262e6f9b5ac25bbe944a65b165dd7eaf11ca35c0681ef93b90d57c7fc8d2a613414b39fd49bf9915a5e0a200f3cf233f83aab4eeac6103ea32bcac4f0392eb527", 0x4b}], 0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="a00000000000000007010000faffffff2a14e32c3c1b6c8187dfbcce7a21cfe322d56ad84c459811bbf7270df77c7a8c190270f6fb6dc38277ac4a9d7494b4517035dbc6a233fd11640ff5bf6b5f97f5575cf7495105143800000000a01a1c0075f6372bba400f170cbc7041f875cfd203000000ce34f3aaef045dd34ab5ec5f97089769b1d94fb07c4854439a98f9e5357c425b39a99910cdc0a36c1cf104bca57ecc0c024ffe13071cac231ec2a727b1b121ea8fd2ac927744454217ce6c5fed425133b53714471a9c66e1ff530595b8a9c342b34c0eac5c03ceff7f61d591e94df4a2d7baea55d25bc850de07ac1e463ceea6c098a9053b32f191d5f2af811c1bf33f4e52a1685699782a64ff00bc2712862c79aeec6682cd85fa677b20694124e7158157cc671d86361325"], 0xa0, 0x8040}, 0x8000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5}, 0x2c) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) gettid() [ 2647.548294] devpts: called with bogus options 2018/03/30 22:45:30 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000040)=@ethernet={0x306, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000f00)="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", 0x1000}, {&(0x7f00000000c0)="0becf9ddb5de40650766d09a62c1791d9aaf2e782d33e0a70903790769e97ae22e68f5324d470481a9f0c4c3c793a2ae6ab9fee4b12c7f6ab8f47a3901632c58051124f00f4b5df44cbd4f2bee6562082a2f99ff8d3437f30ea9823c129ab4cca0d3faf14c0a522f18f29017ab4494e7db9c7f00bb7df27d1a681f5e558d8efc68428afb0b2141e393cbe32ec601b0224bbddc70a644be95d776edcd64d775cde0d605a16a22a543e7b1e8ce74d8b5c4d41b4e4c93f9deaa307200ba11ff3e9cb423d39fc7c32fe30e99fb4120a6a8b6922a19b908e8cf05439b49b3737c4988aa916b72e5d786927a8b4ed9ed07926bbef8d9", 0xf3}, {&(0x7f00000001c0)="63410022f0e8415b026ca26e9e756a49ea973f012c069fce8aad326b0fc8fc6848f04950c118256c2f98f34854716d236241e920a72ff82bdf2080f28b3173f3e389b858a579742926781e46f3781cb61aece09f5009e7eeb1efa6fc1cffb1ca8726573b4be5aef138f5ee46d16bd8024ace24f3862e0431ddb56a1a3b6c8095bd61d79648bc6897c554fb89de23d73063ac0d34d2d5154a05eb6597b6ef85ae6e9b0f75618f670c4b5660946fb7bd8337568a1b", 0xb4}, {&(0x7f0000000280)="d33e157e2ed35b2e5f6439a5e550d116b4af338c622134caab4dd0e45ee83e8c8dced001fe9caecd43c7a01ebddea83a26061151c728f96434d8838b27e9459b10f95b7683f4eedfa6d24d1d41dd03bde08f0de37260978018e92f41c9c5b87bca66c9a651f1b42b1b753475e46a879331aa78bd0015c66b120b6d895ff76c9dc11887ec66c781e69dffbb4798c0f5b2d65032cb1fc178ad5cd376422f9e6610f69d8c28ea77831c66df076fdf4dd9bd4dae5aa4fb92f5fab48f0bec2dbd0be6486f6a56909d754a980ce2f2d8286c8e97edabbfe4d2106db9c79a3f0a", 0xdd}, {&(0x7f0000000380)="0b84fc3974beb588c2d404b0cd6502ae0bd779765ef076bca7ffd10b62e8cdc58c7dcd6e53818f2e6e45f2ba2b65339d2aef6ef3e11f02ce4c7a6ab768bdd8e1e9c1f8431b67fea1348629404efec6079ce11a5dcc6a4127aad8", 0x5a}, {&(0x7f0000000400)="84b189c1d70028b7", 0x8}, {&(0x7f0000000440)="8505690a799618639dd61200e76e29565afa8f49c8789004f2c5d232b944d1b88dafe41412c7da713cc5738cc9a4665b75c553f2dfa418837d66c8b3d8532e4f2b2f8074fada72ccfb4120113e610f96f732f4cb75854dc2240fcfa0dee29e8a179bcb61c01577641f86a76bf9092f9789edee66507646700c54788cd85b8c0f0a5bf163fc7f543defd6315278085d9ee40ee26dfb4dcb13805764ba", 0x9c}, {&(0x7f0000000500)="2bb2700383619d505297b040cf35", 0xe}, {&(0x7f0000000540)="58bab22da579eff1906cb60c95f989691d5a0c756d7186f7639e33b2737db6c35d9952fa067090c0df1eeb61a25bcc235dfc5a6e4ee238cb8efe05944980874d3ea545217865e9d54e82d09c1de6e705c2642030ad5847ff18fa121828e34b7f17c80b3cc3ed41d02134507aaa5115669cfcb288", 0x74}], 0x9, &(0x7f00000009c0)=[{0x78, 0x119, 0x8, "45a7f3ec585b31e4f725c2b0c852415ccba3020942081b93fd62f62cb88dcfc4291a57498f6459f786025c129752196cb4e50485d6d8c71892c62ac6e2f05eadc154ff2298b4b59101de3c1d9a500d359f5b204bb408639bc65bb0f89f852305955ca1d676"}, {0x30, 0x11f, 0x0, "caace12842e68c08322eb5ed432ded2b1d6057d8df80f1fec0376dc2d35ed03d"}, {0x88, 0x119, 0x3, "5a43532d64b050072afc7c732521a91afae3e80d53fa0f9d9313528299078b79f98f068c08300cc728157c77d65559111946bafb0cf42d08f67d15b73a5031dc74975d45f53920c82f7e63aae7e5bf9f96f6529f00a6f67a82b5a76c3555d27a6a1845f7859ecafe02c4abeb2b36c2bfca72c480"}, {0xe0, 0x101, 0x1, "4caa6d9e2935e42ab31b6c2417aeebb704b8b586f8c59f5cb299ddf010e99f3224973a88950b3ffe1420a140a996b9f09814a9a37f79e2ae06acc77d6c731b0190271ab29bfad1e69fa6e707b349d917c1535e7633e587d156eb68d74352da8eca9ed6abe8fb67571496226775050b9bd8d20c988bce4588f67f206c4f44a077a52b3077f16ae7bd2c34e4fbc7cfdd32be00329fe03d6f0c416b277cd1b015f7da6c72ec45ab3709f10a8e611e95195ff034719d323f78338f28c566cf0f86962946c4ba12b5be21d3"}, {0x10, 0x103, 0x100000000}, {0x30, 0x114, 0x100000000, "98331d4db9b03952a1fdea1276878b20b674d5373ca3f3df0d18e0"}, {0x18, 0x84, 0xad, "25f2c8"}, {0xf8, 0x101, 0x1, "339172618e5615d70b626c3d11c103e0e704349ec1d1dc1fa0dbae1145391add76ada02491bdc75809a3109e8a6cc26a1a79ee4b73663a093790bea32e23e454d184e5559e0414eeba3ae46aaa7691a4901887918b2e1735b0e2efd9a06571e0e40a8b90ed803e30dcafb42ea0cbed8b3780cded8bf0dd3dac11214b8b613ac7b260cfd312b69cc58fcfab5778c77db8e106c7fc8113e57a3e3cad5b1d5aa28f2446d75b6acc02b6d333d148aa9e4c8da521b4cb206a9693e701a5e7c00d47ce96099719e2f38db55802443e846a65b70b292b642af10ad98ab6299ce8f1359317055a0caa48ef"}], 0x360}, 0x10) close(r1) r2 = socket$kcm(0x29, 0x10000000005, 0x0) sendmsg$kcm(r1, &(0x7f0000948000)={0x0, 0x0, &(0x7f00005dc000)=[{&(0x7f0000d43000), 0xffffff1b}], 0x1, &(0x7f0000d43000)}, 0x0) sendmsg$kcm(r2, &(0x7f0000000e80)={&(0x7f00000006c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x2, 0x1, 0x1, 0x4, {0xa, 0x4e20, 0x723b, @loopback={0x0, 0x1}, 0x3}}}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000740)="6617b485f5bca426c35cbcca1db48e3cd54d2c8cdddefa9bf10886198ea9c3b38ff8708ec170ae1a3ac8b72f5adf529356627a495917114d30e7e0b013a0f3d879d389081b6c9f96cfeb955ed21c584be791640134dbff47cf3af68904297d95668df262e164fbcaa4f85543ad9783f5308f89d0165839ac84536ad0e316800035ac244065cf2ed2c2c1e198d83aa9d75345771e993eac8310a96115b45350e98737b372fe0dfb0201a01fc29a53ca131cb72866eaab0968d3363375000787dab1dfcca206034b0644b439fac3725b2b29ed06ce21a10f02bd0790d0fb952cc2ed266c", 0xe3}, {&(0x7f0000000840)="0d0d028c19267ca4f942a3856eae77fb7e0a786b493c58fbcc37546fbb047fe790eadd87e6b536714bcfd3041d8b89bc325f9805d0749c05adee786ea0596cde9ee2208db9160de2e769787918dfa32034d13c704f9fc392c61c64555a43624e8eb5d21e0d07808bc1b1381294b000b5bb90315497449e02e2bae2b8a9fc7e7b232673ae0a432e1ac2ccabb84ae1c3e7c7ba9aceb9e6107d91022d6bc1331ae89eeac4da9b881ab3", 0xa8}, {&(0x7f0000000d40)="2065a68c094bf05f1c5300f2bd478d6849a241d1ae9f672b3873ede60d26d69fdb4bc2ff65d3cee00db89d66af9245ab42db996f0a6cb1a78b7cb9b171b1ad62a535536ff0e8dd5fb5d2476a0d2d95ba05c9757bacefd66d2f6d549b77d1a07decd034f402934026f0f619cf7f7fe838c60eea25b9a126e335697522c70e25681f46a54e1c84419d9525771bc573075b5dea9fce8f6680773298ad05a3f9b7147ebbb185ac672b6bda738877a1a9617c7a5f1b165e33f89c6ceb8f94f4339f1a3f35b6f41a9cf2c3fa896a6cdcc9d4a5174fc619a6bc5ae1538d10616253911e8f30e436d95d76be177b3424d1d8dd76", 0xf0}, {&(0x7f0000001f00)="28d9a33495e1f46286e941f0cf255890e60b8d32f9eb1aacbb4b9cbaa7ab6af3efafa775eb872f07e85fc5d9a0d84fdb074306899faffb726a77ea37a36b06693d24e1cacf9885060ee01347163adbd264698663a65e2bdfe78a948831ae98515994d4c017b02277b3e04247d66c0d4b419414ea9c597dd9cf6a4fcb218a042483a7f30f8e42289015dc6ad249fb547d36500f64ab8fb66c9cea23ce950019ff1348541f", 0xa4}], 0x4, &(0x7f0000001fc0)=[{0x80, 0x0, 0xd3e, "ef3176833539287d0039267a01a5273b2db9752df7f49a051b9beb0501e80d9311dd3e7008b528e790c16af48afa3a35dbab87cf4ae13ea0dd2898a8aa35db50d5d81cf2e72302ad660f41098c308951147840964cd0924206b94256f07584ccf9d706d2524401497b080c347ab2"}], 0x80, 0x4}, 0x0) sendmsg$kcm(r2, &(0x7f0000000ec0)={&(0x7f0000000940)=@pptp={0x18, 0x2, {0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000d80), 0x0, &(0x7f0000000e00)}, 0x40080) sendmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000380)}, 0x4040050) socket$kcm(0x29, 0x0, 0x0) 2018/03/30 22:45:30 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x10, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:30 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbd") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2647.706691] FAULT_INJECTION: forcing a failure. [ 2647.706691] name failslab, interval 1, probability 0, space 0, times 0 [ 2647.718304] CPU: 1 PID: 5644 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2647.725503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2647.734864] Call Trace: [ 2647.737465] dump_stack+0x194/0x24d [ 2647.741108] ? arch_local_irq_restore+0x53/0x53 [ 2647.745805] should_fail+0x8c0/0xa40 [ 2647.746661] devpts: called with bogus options [ 2647.749537] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2647.749556] ? perf_trace_lock+0x900/0x900 [ 2647.749575] ? __lock_acquire+0x664/0x3e00 [ 2647.767612] ? find_held_lock+0x35/0x1d0 [ 2647.771691] ? __lock_is_held+0xb6/0x140 [ 2647.775778] ? check_same_owner+0x320/0x320 [ 2647.780103] ? __d_lookup+0x4f4/0x830 [ 2647.783916] ? rcu_note_context_switch+0x710/0x710 [ 2647.788875] should_failslab+0xec/0x120 [ 2647.792878] kmem_cache_alloc+0x47/0x760 [ 2647.796965] __d_alloc+0xc1/0xbd0 [ 2647.800437] ? shrink_dcache_for_umount+0x290/0x290 [ 2647.805470] ? d_alloc_parallel+0x1b40/0x1b40 [ 2647.809984] ? lock_release+0xa40/0xa40 [ 2647.813978] ? mark_held_locks+0xaf/0x100 [ 2647.818135] ? d_lookup+0x133/0x2e0 [ 2647.821775] ? d_lookup+0x1d5/0x2e0 [ 2647.825412] d_alloc+0x8e/0x340 [ 2647.828713] ? __d_alloc+0xbd0/0xbd0 [ 2647.832429] ? full_name_hash+0x9b/0xe0 [ 2647.836420] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2647.841698] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2647.845945] rpc_populate.constprop.15+0xa3/0x340 [ 2647.850799] rpc_fill_super+0x379/0xae0 [ 2647.854780] ? cap_capable+0x1b5/0x230 [ 2647.858674] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2647.863874] ? security_capable+0x8e/0xc0 [ 2647.868015] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2647.873194] ? ns_capable_common+0xcf/0x160 [ 2647.877503] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2647.882673] mount_ns+0xc4/0x190 [ 2647.886030] rpc_mount+0x9e/0xd0 [ 2647.889382] mount_fs+0x66/0x2d0 [ 2647.892731] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2647.897294] ? may_umount+0xa0/0xa0 [ 2647.900904] ? _raw_read_unlock+0x22/0x30 [ 2647.905037] ? __get_fs_type+0x8a/0xc0 [ 2647.908909] do_mount+0xea4/0x2bb0 [ 2647.912427] ? __might_fault+0x110/0x1d0 [ 2647.916473] ? copy_mount_string+0x40/0x40 [ 2647.920689] ? __check_object_size+0x8b/0x530 [ 2647.925171] ? __might_sleep+0x95/0x190 [ 2647.929134] ? kasan_check_write+0x14/0x20 [ 2647.933358] ? _copy_from_user+0x99/0x110 [ 2647.937490] ? memdup_user+0x5e/0x90 [ 2647.941183] ? copy_mount_options+0x1f7/0x2e0 [ 2647.945663] SyS_mount+0xab/0x120 [ 2647.949104] ? copy_mnt_ns+0xb30/0xb30 [ 2647.952974] do_syscall_64+0x281/0x940 [ 2647.956844] ? vmalloc_sync_all+0x30/0x30 [ 2647.960986] ? _raw_spin_unlock_irq+0x27/0x70 [ 2647.965467] ? finish_task_switch+0x1c1/0x7e0 [ 2647.969943] ? syscall_return_slowpath+0x550/0x550 [ 2647.974938] ? syscall_return_slowpath+0x2ac/0x550 [ 2647.979854] ? prepare_exit_to_usermode+0x350/0x350 [ 2647.984855] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2647.990203] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2647.995038] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2648.000208] RIP: 0033:0x454e79 [ 2648.003377] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2648.011067] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2648.018317] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2648.025575] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2648.032834] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2648.040090] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000042 2018/03/30 22:45:31 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400), 0x0, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:31 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000c47fec)={0x6, 0x4, 0x6879, 0xb, 0x0, 0xffffffffffffffff, 0x0, [0x4]}, 0x2c) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000180)) mkdir(&(0x7f0000000040)='.', 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)=ANY=[@ANYRES32]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = getpid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0xff, 0x9, 0x8f, 0x6, 0x0, 0x6, 0x1000, 0xc, 0x3, 0x20, 0x1, 0x7, 0x6, 0x1, 0x6, 0x9, 0x9, 0x80000001, 0x9e8, 0x0, 0x3fc2, 0x7, 0x4, 0x7ff, 0x3ff, 0x2, 0xb1c1, 0x100, 0x6, 0x1, 0x5, 0xdb49, 0x1000, 0xa4, 0x4, 0x0, 0x0, 0x8, 0x5, @perf_config_ext={0xe11, 0x6c61}, 0x1008, 0x1, 0x1, 0x1, 0x5, 0x5}, r3, 0x0, r2, 0x1) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x3, 0x5, 0xfffffffffffffffb, 0x9, 0x0, 0x2, 0x400, 0x5, 0x40, 0x8, 0x100000000, 0x9, 0x7ff, 0x1, 0x8000, 0x9, 0x0, 0x70a, 0x8, 0x4, 0x400, 0x500b, 0x7, 0x8000, 0x3, 0x1, 0x8, 0x4, 0x2, 0x5, 0x1, 0x400, 0x0, 0x157, 0x0, 0x9, 0x0, 0xd44, 0x1, @perf_config_ext={0x1ff, 0x3}, 0x20, 0x1, 0x7, 0x7, 0x58b, 0x3f, 0x3}, r3, 0x2, r1, 0x1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r2, &(0x7f0000000340)}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r5 = gettid() perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x0, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0x0, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x0, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x244, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r5, 0xd, r0, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r6 = getpid() perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x9, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r6, 0x7, r0, 0xb) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000002380)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000001940)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0xfffffffffffffef9}], 0x9, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x1a, &(0x7f0000001d00)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000000000000000003d01f0fff0f3d370d000cdd82197608559b2f59b000017d2a687b6b71138a8c5149dec9a563761561eded4460cc7b04ab91d153a5f61394df1b7e3221c6834becd1cf17013c5085dfe2822774a29dc96ac42fbfb95fa222d625f0a24df8d5a03a351eba6182d32645d3de358a5070bc257c2656009796e9bba548fd6eae51e053d30f9b6c6dbc69c3be327aa45b8615d47b86f5036ac3e1bbe1f4de3e3176bbb54"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) 2018/03/30 22:45:31 executing program 3: mkdir(&(0x7f0000003dc0)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000003d40)={&(0x7f0000004400)='./file0/file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000026c0)='./file0/file0\x00', &(0x7f0000002700)='./file0/file1\x00', &(0x7f0000002740)='selinuxfs\x00', 0x4000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mkdir(&(0x7f00000028c0)='./file0/file2\x00', 0x122) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000004480)={r0, &(0x7f0000004500)="17c3b4bf0f009920184b34e120312adbf0adbd139185f6c7820b2ae55e319748c102af41078d26eccde7c04685fbedb3adedb10c3c16da3b15b267ec3e4eee6f2bf0f6a53d216be390289ecec7017d718564e7458275aab9caa107afb74c3e811b2c0e3f53f6ef9132da572e6c5b8f"}, 0x10) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000004440)='./file0/file1\x00', 0x0, 0xf}, 0x1d5) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='aufs\x00', 0x30400, &(0x7f0000000480)="cd7fe75366440233e9a1b0cb0029c7c27528c3f5cdca89ebea4c4364662a1956824e2be8db6add9edc6f01f0b472297d6269e90738ab0339859a3b2bcb9564cfe470e758db7634b6ebbe4f79f810a80530b480238bd142fa8feeadc0cd81ce166c12fa74162c99ff193aab06e3e577126566c604ab1c140b926e0aa251d52c47495e6cec6989cda6b1f3bdf5f9379fceb60e23081cf49ed2726c83a4f76f9f8554") bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x16, &(0x7f0000004a00)=ANY=[@ANYBLOB="180000801f00000000000000010007000000000001006a3a0000000000000000950000000000e3df9a34fd48e5d2ac24aef1e618b5ac68b08e592ec5a3835d64081390b4a833942ae756c06215ae221a507bcad9db961a3e30edd0380d53bf98b8c71035c160f7a4480b2b829897ba891d7f8c53f7309a9d0038eced035ed2d2f1314c57793ec90efe8b92bd8a09845ad639a2031b2fdfeed2bc9f3f000000000000003281e1415e2505a29cba7cb4bf2784ca"], &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xd8, 0x6e, &(0x7f0000004900)="3447f36cbc3563f8dee5d01dbcef53155c2c19759cee00b8d23f2ed222a84d546cbfc6661d16b35a876b395e78db433dd7afe2b006840a491cbf0984e85935e1fc71ad2a3a9d3d1c3f6ab1dc2b674255ad98f468819f094caf459faafcaf664e946b7c080a3ca69be7100a1189907cd76b370747b31f09ee0f568f61bf3cfa05fb3f33e54c082dce00daf1523b6b19c0d93d6206b7a2a54f830a60cb2de228796dba56359b3da27562ecaca0a516afda985cee23490d12ade2fa33bb3b3a4ea426a4f9dde4c7005e703e33aa55e9a1a15e094eaf9ee6ecc8", &(0x7f00000000c0)=""/110, 0x1000000}, 0x28) r2 = socket$kcm(0x29, 0xfd17dc2d8fc45819, 0x0) recvmsg(r2, &(0x7f0000002680)={&(0x7f0000000540)=@can, 0x80, &(0x7f0000001640)=[{&(0x7f00000005c0)=""/95, 0x5f}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x2, &(0x7f0000001680)=""/4096, 0x1000, 0x20000000000}, 0x21) recvmsg(r2, &(0x7f0000003cc0)={0x0, 0x0, &(0x7f0000003bc0)=[{&(0x7f0000002900)=""/29, 0x1d}, {&(0x7f0000002940)=""/32, 0x20}, {&(0x7f0000002980)=""/203, 0xcb}, {&(0x7f0000002a80)=""/22, 0x16}, {&(0x7f0000002ac0)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0x1000}], 0x6, &(0x7f0000003c40)=""/98, 0x62, 0xdfee}, 0x1) mount(&(0x7f0000002780)='./file0/file2\x00', &(0x7f00000027c0)='./file0/file1\x00', &(0x7f0000002800)='v7\x00', 0x1000000, &(0x7f0000002840)="edcc947cc3233cb218d496c966d2c7409949b9eaa565b16b6a47e95877b2b8961ff8faa08dace4ea8de486780e0f9316ee1fa968c4b73234bc51d702ec0c75fbc6c4a09765fe3e0a1f5f41a2a77b072eb6ad8e6b5d8d3080c3213b484ddb02510e6f01808543736769104e174a2058") recvmsg(r2, &(0x7f0000004800)={&(0x7f0000003e00)=@rc, 0x80, &(0x7f0000004300)=[{&(0x7f0000003e80)=""/165, 0xa5}, {&(0x7f0000004740)=""/145, 0x91}, {&(0x7f0000004000)=""/252, 0xfc}, {&(0x7f00000002c0)=""/27, 0x1b}, {&(0x7f0000004100)=""/36, 0x24}, {&(0x7f0000004140)=""/136, 0x88}, {&(0x7f0000004200)=""/195, 0xc3}], 0x7, &(0x7f0000004380)=""/80, 0x50, 0x40}, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003f80)={&(0x7f0000003f40)='./file0/file1\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xd, 0x6d3a, 0x36443300, 0x4, 0x8, r0, 0x1ff}, 0x2c) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000380)='ocfs2_dlmfs\x00', 0x2000, &(0x7f0000000400)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000004700)={r0, &(0x7f0000004580)="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", &(0x7f0000004680)=""/103}, 0x18) mkdir(&(0x7f0000003d80)='./file0\x00', 0x100) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) 2018/03/30 22:45:31 executing program 1 (fault-call:19 fault-nth:67): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) [ 2648.072703] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 2648.112403] devpts: called with bogus options 2018/03/30 22:45:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000080)=@raw=[@alu={0x4, 0x7fffffff, 0x0, 0x7, 0xf, 0x0, 0x10}], &(0x7f00000000c0)='GPL\x00', 0x8, 0x12, &(0x7f0000000100)=""/18, 0x41f00, 0x1}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={0x0, r0, 0x5, 0x1}, 0x14) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) sendmsg(r1, &(0x7f0000002d00)={&(0x7f0000000540)=@llc={0x1a, 0x110, 0x10001, 0xffff, 0x1, 0x8}, 0x80, &(0x7f0000001b40)=[{&(0x7f00000005c0)="8e5de79f3d923c5ffaa14e3fd30dc503a8a5ff434e6a2cfaf901b0ceca31301a52db625dc6c79d991026ad20e51b895c20a0572d7b50ae1f5244500284054d21893a157c3559dd945b72f0a4071485913281eeccd65c1e3a515dbdef3eae16a92400b32a636288d1b76e15adbe18d866a74580066d36dde6a8e5d1cba46a85a62371e15f4696dd133cf9fe157ccff12efeeb2bdfd4ee448befe6361d5ad71b09759760b5487393b3985879e0e90b06f07ab90cb43f017ce9ac3bc5b640dcf15e18c7f953b320e67cc87c1de1d730376b2ec6ab3aec73d134d7bf7c0b1b8dfc24e5725e1fa56af1", 0xe7}, {&(0x7f0000000700)="bff7a3c54ab9d6d8fc579b0e653a0dc21e9b53ae6cedc01fda969a577b99c90b653e6c6bbdc95aa16a9852b126818f07bb72", 0x32}, {&(0x7f0000000800)="020d6bf3c0fa2ae761ace4a60b2925c5522fffd2448a0cf4073fef05f6d154b9a9fa612ca0ba4a415d455bb30403e0120b8fc508d90cf0edea131920223292fc64d18ed62e7faa9c6c51a74d7e44c3fa63308f1640df9299dffdb8b60c5e3d9df8681e65a311f1391ded1bd94460ae783e1ee96fb38a4aee8cee719e09cfa10bb8bb5e8d2ac25f516e622afe9dc86ca51f6b433f3fd91b4f5113812422cfd76938d688f38776918f79495583e781c51054", 0xb1}, {&(0x7f00000009c0)="d403c465ebc9391734db197ad9f9e0d92e4c128d3cc198f444056e2ad182acab97e5a9f27e1977d4f659f84092fba82f571eb0b140765f53fbe0511d7e18ccbb4450bd382e4de4b32d352b875e00e676af1467fb4b90214091af11558a34379ac101cfbd9a24d4c933e4288e25acdc2799b8855cf39a336819", 0x79}, {&(0x7f0000000b40)="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", 0x1000}], 0x5, &(0x7f0000001c00)=ANY=[@ANYBLOB="300000000000000000000000060000007a2147a48140acd740aaa99fd19b7643531ed8b863d756249411000000000000500000000000000017010000ff0f0000bf77e2ab70fff4bde43eb007e81a5d068c4da0005c48e135566dc536500e2f9c07990207ffbcf8464f0000000000000000000000000000000000000000000000"], 0x80, 0x40001}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock, 0xfffffffffffffda6, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0x9a}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) close(0xffffffffffffffff) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0x50, &(0x7f0000000480)}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r3, 0x0, [0x115]}, 0x2c) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000003c0)={r1}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000780)={r1}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f00000006c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r2, &(0x7f00000002c0)="6d48c49719f615815f08e7896ebd961e4226d7a3ecd24af90cfd044ec0a9d1aecdfc6a2c64236f79a6779f7320cc4a6732637c8be2765f402a28e4e943e661330d2195c1685c0062790ec2fd7368552255f2c84a773aa597c76ecff3dbc2ebc19cd8a910586e58f1eda1ab0bea157703d41aef91b8e6eb977d821b145333648b6df2eb836638b50a3553633e6d3b"}, 0x10) [ 2648.133816] devpts: called with bogus options [ 2648.222580] xprt_adjust_timeout: rq_timeout = 0! [ 2648.355126] devpts: called with bogus options [ 2648.368374] FAULT_INJECTION: forcing a failure. [ 2648.368374] name failslab, interval 1, probability 0, space 0, times 0 [ 2648.379735] CPU: 0 PID: 5695 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2648.386928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2648.396285] Call Trace: [ 2648.398884] dump_stack+0x194/0x24d [ 2648.402509] ? arch_local_irq_restore+0x53/0x53 [ 2648.407183] should_fail+0x8c0/0xa40 [ 2648.410898] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2648.415999] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2648.421194] ? __lock_acquire+0x664/0x3e00 [ 2648.425435] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2648.430632] ? find_held_lock+0x35/0x1d0 [ 2648.434690] ? __lock_is_held+0xb6/0x140 [ 2648.438754] ? check_same_owner+0x320/0x320 [ 2648.443070] ? __d_lookup+0x4f4/0x830 [ 2648.446863] ? rcu_note_context_switch+0x710/0x710 [ 2648.451785] should_failslab+0xec/0x120 [ 2648.455751] kmem_cache_alloc+0x47/0x760 [ 2648.459810] __d_alloc+0xc1/0xbd0 [ 2648.463253] ? shrink_dcache_for_umount+0x290/0x290 [ 2648.468263] ? d_alloc_parallel+0x1b40/0x1b40 [ 2648.472748] ? lock_release+0xa40/0xa40 [ 2648.476718] ? mark_held_locks+0xaf/0x100 [ 2648.480856] ? d_lookup+0x133/0x2e0 [ 2648.484477] ? d_lookup+0x1d5/0x2e0 [ 2648.488099] d_alloc+0x8e/0x340 [ 2648.491375] ? __d_alloc+0xbd0/0xbd0 [ 2648.495079] ? full_name_hash+0x9b/0xe0 [ 2648.499056] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2648.504329] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2648.508562] rpc_populate.constprop.15+0xa3/0x340 [ 2648.513400] rpc_fill_super+0x379/0xae0 [ 2648.517366] ? cap_capable+0x1b5/0x230 [ 2648.521254] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2648.526438] ? security_capable+0x8e/0xc0 [ 2648.530579] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2648.535763] ? ns_capable_common+0xcf/0x160 [ 2648.540080] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2648.545262] mount_ns+0xc4/0x190 [ 2648.548625] rpc_mount+0x9e/0xd0 [ 2648.551984] mount_fs+0x66/0x2d0 [ 2648.555343] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2648.559916] ? may_umount+0xa0/0xa0 [ 2648.563534] ? _raw_read_unlock+0x22/0x30 [ 2648.567669] ? __get_fs_type+0x8a/0xc0 [ 2648.571548] do_mount+0xea4/0x2bb0 [ 2648.575075] ? __might_fault+0x110/0x1d0 [ 2648.579133] ? copy_mount_string+0x40/0x40 [ 2648.583355] ? check_same_owner+0x320/0x320 [ 2648.587669] ? __check_object_size+0x8b/0x530 [ 2648.592159] ? __might_sleep+0x95/0x190 [ 2648.596130] ? kasan_check_write+0x14/0x20 [ 2648.600356] ? _copy_from_user+0x99/0x110 [ 2648.604496] ? memdup_user+0x5e/0x90 [ 2648.608200] ? copy_mount_options+0x1f7/0x2e0 [ 2648.612688] SyS_mount+0xab/0x120 [ 2648.616132] ? copy_mnt_ns+0xb30/0xb30 [ 2648.620010] do_syscall_64+0x281/0x940 [ 2648.623883] ? vmalloc_sync_all+0x30/0x30 [ 2648.628022] ? _raw_spin_unlock_irq+0x27/0x70 [ 2648.632513] ? finish_task_switch+0x1c1/0x7e0 [ 2648.636999] ? syscall_return_slowpath+0x550/0x550 [ 2648.641917] ? syscall_return_slowpath+0x2ac/0x550 [ 2648.646836] ? prepare_exit_to_usermode+0x350/0x350 [ 2648.651841] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2648.657194] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2648.662031] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2648.667208] RIP: 0033:0x454e79 [ 2648.670385] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2648.678083] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2648.685338] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2648.692597] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2648.699852] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2648.707108] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000043 [ 2648.716367] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 22:45:32 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400), 0x0, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:32 executing program 0: r0 = getpid() r1 = perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x8}}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x2, 0x80000001, &(0x7f0000000080)) recvmsg(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)=@ax25, 0x80, &(0x7f0000000480), 0x0, &(0x7f00000005c0)=""/170, 0xaa}, 0x0) r2 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2ed}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000013f80)={&(0x7f0000013dc0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000013e40), 0x0, &(0x7f0000013e80)=""/225, 0xe1, 0x1ff}, 0x10000) socketpair(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000b40)) socketpair(0x5, 0x6, 0x2, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', r4}, 0x10) r5 = socket$kcm(0x29, 0x5, 0x0) r6 = getpid() r7 = perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x8}, 0x10}, r6, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000680)={&(0x7f0000000400)=@ax25, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/125, 0xf9}, {&(0x7f0000000300)=""/3, 0x3}, {&(0x7f0000000380)=""/60, 0x3c}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/175, 0xaf}], 0x5, &(0x7f00000005c0)=""/170, 0xaa}, 0x0) recvmsg(r8, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000040)=""/93, 0x5d}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000b80)=ANY=[@ANYBLOB="b7e08dd5b76c8afceeddd5e4a5d6450135b321"]) sendmsg$kcm(r2, &(0x7f0000001480)={&(0x7f00000007c0)=@in={0x2, 0x4e21, @broadcast=0xffffffff}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000840)="57b3ceeed6339b8ebb55c7150a3f6432ce34b34cf30e5091b13d42aa8536", 0x1e}, {&(0x7f0000001040)="0d93a1102672f7ed761ae346130df3e5dcf177b4444e14578e6bd7c67c43ddb2281c74093819589df2ae1f86fee581c5d37621be17fecf2a6608d58d7d548c894c165e03a936f76b8a5ba5df47f67c68e80f130b6783e1dbc38dbe59df7efe6d7ced19edea4f9ae668043d45a378d7fae52e6ca227fcc042e033c9c594ac8cc0d8b3193cf16b7f3bd9c06e1ba4c46afae3b06793efe5e9da8cb0b7a6dceaab4a5757c9dfe0bbed63a94613a3980a7601c1a3c45a72eee213289c295775a5603b8ebab66892f36ba99d3ecb4d3a952aebe39e25a64bdde89b52c25fd6c915caa22e8d0e6479532bed3eb5436c9a9b48798c093e60199bd471c57023a0", 0xfc}], 0x2, &(0x7f0000001280)}, 0x20000000) getpid() recvmsg(r10, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000980)=""/133, 0x85}], 0x2, &(0x7f0000000a40)=""/140, 0x8c, 0x9}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000014640)={&(0x7f0000013fc0)=@can={0x1d, r3}, 0x80, &(0x7f0000014100)=[{&(0x7f0000000f40)="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", 0xfb}], 0x1, &(0x7f0000014140)=ANY=[], 0x0, 0x400c084}, 0x100000000000888d) close(r1) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x2, 0x3, 0x1f, 0x0, 0x80, 0x5000, 0x8, 0xfffffffffffffeff, 0x9, 0x7f, 0x0, 0x7, 0x401, 0x0, 0x7f, 0x0, 0x7fffffff, 0xed3e, 0x8000, 0x2, 0x3, 0x0, 0x80000001, 0x1ff, 0x9, 0x6, 0x2, 0x80, 0x9, 0x9, 0x0, 0x2, 0x0, 0x40, 0xe9, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x10000, 0xb737, 0x19c, 0x0, 0x1f, 0x1, 0x1}, r0, 0x2, 0xffffffffffffffff, 0x1) mount(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)='./file1\x00', &(0x7f0000000c40)='autofs\x00', 0x200000, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) 2018/03/30 22:45:32 executing program 1 (fault-call:19 fault-nth:68): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:32 executing program 2: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x0, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb1104058d8843") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r4, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000940)="a692888b971ee0ceada04ed47305b4dbfb0af23d52fe1caa183c2587da", 0x1d}, {&(0x7f00000019c0)="d1969aab40451ffc88f03d4691b06551db1c6da4c1563981f3d0f8da6732e1d331cc5a76250acb64ead0eb0cd4b4a9dfac86904b0f92ea7cbaedd402698cfe7e95d79d2718cd9deefefdf03002cb9e530aaeff343702b508fd5e5bb1711eccbe7e74caf4a3a57d985b9e25e0911ed11fa7d82dd88839151a1859983ee171cb5d56b6bbec8a89886f845bad4962343014dcd944e6f676718eb37c30b0a417456698f935c91d6e083c942899349d9da36294c0420bf1b6fd2b876be87c4bda72a01a9ea89b23c5ac1895db4222eb3786eaf3dc105586c278743a9ab58f2128fe2d3d7e565ab19e305afc5965a3c9c53bb013555b6426837de6bc046e54652f1dc0a1b88709938dc02d1070ce71166500c16c2727a0d98483eda5beab606054b3182316e1c03c1b6bce3d7334142a4fc279b90ae2e11d747eb44ec08c5b527011fc13ecea5ab49ea740d88a1c08259ccc4f140f5f83ae94ecd197e8dd5824b3e6d764f179b2beeb95c8e6b6e356d23468f027e4ed6ac81d9da69af273aeb1801ecbc1b89e7fb4d52c3ed802233bf0125aed68fe5ad3a4d7f3e2e2a1aa74c75e2c14269749b16cf78b589b727092bc77d313513f418bcd506fa44e648067065150a4b2b82ee4730c5e1c5a31b13059eec55227e8105e3e38b17c29915e5869ccfd3761b3598c035f22fb6c59975f9df3df91e1ecd2e5fa0f7d9b8b8e206b30ccbc5cc22cb6859f5603cb57a0878d13bc15226b70b0222bbda4913bfb92ca758d885f85f6e774a5830d977d4624e38bee78fee71cfe0295e18f6034a1b14a2c6238df204b936e783c554c62ef0e60cf5725ecf71ddf28adb3ba525915afa4e287749ee6afbb9fc9ce9074c2d52f6e088a05c2f4d2963a09f76d8898de914a88b40899bd815b13749381877685fe47635a60cb525203ad119e52e72cad048cc7ef90efc4062672a142c6f1e0d2d1ac3f65b137c325cc81b322ff89b7f623e2b0883552871b33e4314ae9cb4374451186d770f77ddf90b61d89267775f26f92a1244b1c09e2d49ae8c6a736d8d6dac08d99e0d911a69a500375edd6779c0a3b77e25a778b16b5f053034b12c425c3be09d32f511c0437a83c9d828b363f1dd368855c2fc0140cd3e8d7d5396d7e1e7d02fc777b3b964c6d371ef8473132d5460b891bb57c3d77afa0c53c8cba99457a0f68134c357cb0baf1f5221151d0437390ed17c6a47e2773b56de0cac22887c50ae349e0c50d4f95244dbc36336d358fc3bba329d9d693d25674c6aafccdf3bb9a4a2ec1a4a0637988f348d04702e150b8745774b73dacb84cb9df2a7149b52a29943ea5ff248ad4078d135edabd2af660263d16283cd88a6c48eae63f9a4df51718795d377485fb02cff083bdb723f692a4a332af1b5e448b4ac7ff79992e60a4fb11b31b63b67872dba88ad7824ba11fb9ad07715a5707478fcd8848e82ec6b24bf5abb6cda28240c3a89a77448cc90f5978e1094ae8abb49ab9ddbde87076c12dd78418d1724a0b9953fecaccd68749ff34d82f95224fcd591964a1c892723aeb1bfda14f2372be1e61c71bda057547ccc5d578ec025010f5c17ab2d85e572fa50f833755a1523059fe1bc655f3fc539242cfd7ac82f51931e4397c5750c17e3bb98a45d7d928b4e6d4fb4cad171f1ed32a4e0d380edbb5dd40aabf5663b0a8dd604e919665596b060b384021ed97b29e322554bbc454a29702d533092c338066e931e9be77e181dad183c5d1e5d5aa1fb236df9388fa8f84576609bcfe8651f26ff685b3c970e3dd32f4ad7d26f54f35ebd6ba41d657bb39cd885ca92e8b07d0f0702c3ddb0b294718857f6bcbde4fe89d7dc7eab1d3cd2a8eeb0fbc5512a07f50f5c19a010634db112fcf2c7a119b0c4ae066ec6b5b11b3d02cd5a58d63212ad8467fc9e526c4ba2f9100ab0409559562a713573f77750a3125ecde980e49761de1dab0943eed9380f8bacfacc6dc8bd5cf974328892905936c99e5d2f5f9ca0d7e652319b9131179166b529e5c4a9af135c8bd8679eef0728f9491272788321f5fcbbdf2ffd1d8ef917a02c9f39dbfa404ccb90a1bc64bd1ce61c7e7f77afb7ef733a350e8a15ece35426999f0ee248fc3087c91cd564884ce50b88d7f1fd8e056d7420c10edd7549f69ea0cb7faa8662733316c1529c208a33d62a8508a8edaebfb4515dde5ce98a746879f8eb244e619ad04c74854142d581fcc61e2f7c846d5f14de5b4a3bdae4ca232b2e8b743b2001120df8d51fcdb8ac9fd8d1f0dadc065441d65de37ba3da7ae2147ac1dce314aa0d6d12db5924378792e72b7544a401974b5da803a1da5a86979a7a767c157272cc35b48d8a7703de02a456df3b40feda00a8e34237d045e38706d1cf52da33d138873e6132c751adefdc5d84766979385eb3045984fb88e699a076ef34d07984bcd0d03f49352a16ad859f899ac42dc5a6e0b3a75c567982354c43a8abdcb56a3b598691a86984b8d922a172ca8aed59be1a545b42a43d17b68d7ab534926ed8fe51ec2ed2d8113f5cc9bb4945af6f8be998bd71c35fa49c52bfa5aeebdb42ea6bf99b875e7a3cbb172ba20f59b76d0d725e649222597f22905a20b02a9ff256879477538fa24b708a1b803db273a37b4db90c26b83f08808f0f3dc54f9847aa61b74201805439a51dcac4e7c0e3f5d877ce1fa74cd17c3e3450dc1a0f2c808032589a7aac909b465bf8c4827b8b718c22dca9024ead6406a5a3ce1793d9576da0c65a0e8f3a9da04c5d38e46ce732207f9ae38a143be75c6e3071a6daa0daaeac462a54fc974a46c02a851e5112fe248e00bfb96758b0d70169e36846e7cd92082f735400831007df64abd05973b3079bd6fab7a939c039d2bef75b11dde7792225b933526b9d863a38f5fde72a9f2ab81e4f09adcbefc16bebf3974395fc3b2c8b55223ee035b10ac2375566db4e7d2f7a73b17441de5354a62a944845f7e4c68f33c92a7f3e8abb685c1e3e300d668748a354d8c998da21558b2ac414e6d6920f1ba8473272debb1407e6b2fe47fbfbcf859eeb0ad8921f16b5e936327ed624fc5350ea22537904527048ae6c7b955e9d92c645815abe617a7438cdab8c938a1bb1b8cff74a03ef77a498e39a3d99340eb9d5a259b58fb4b71f05c771814f8d82663cbe5bb38a4389a5b65aec3815fc4449dc3f472dd1e14aa10133c395ba5a429e4a206b36b37b68392eb945c1de3afb61ab344676970eb123feaa8d54eb8eda383d8f0ad7b01630337db48b06362c267f3e2edb523726a1283ade50af5bfb984d983ed7e28d570b759e5b615b931be022a188a8627b0d4e7ad3321c3589d6a60c1c2af8faa7860628e52f359fa5ff1ada767d5786f518362d80b0ad18fbb86377762ce9f8e593ecaed0ca23a0c07f4f80df07fbcec58e60b2e3b1f5d8a3e59746e41917c5efcdc1160fa0933fe124998e85ba6954e3d32502aae890b2f339d5f122689101e4d9e1b826ac6116da4c964269f7d887d9032d4cf4212b449f4086003a29dc0ec34a89aedfe9cd5a091dad29b31e2a89f7db2fa3a4d2db6c7a7e96cef66cda8d79daa5cd1c8ca55fb896f344dce79471dc67398fdd0800b362a494f9e0e5d1e6b2e4479580d5ecbdc47672545c79666735e087d71e1e8f29b28c568b7bd569221261bbbf795dcc852d5cab41a4e0ffbee3e74a63bc76290363b29f34333498b041dfa92ec456e523c160d16db555fb32dd667d513ac306aec1dbb84e2ce21aedc13e0e3404ab5fc7c10a076d25421cbb64c19773e266c66ecd5bc471bfbf3dbcd997b5c629bf0063081e6958bb35e77b1a95f8656e55a87806606852b8f4f8f4005c2f4340dae6073a4bdd2ac9ebf16b333a550c7c4b9337a8d9584e89ac6aa732ed0b03ffe27927405ed624fb35026e2dea0062d51258938ef560fe13d561a39e4a5b6842015e70bb18115d1477c788eef44ede8ab81938e9d448ac14d4319851540bd2636735a9f7615e7a9c4a9b51ab79f34d6d02573c3b46ecbf02a83ce0aacf963e21fa56a52606c622cab2f34b035d02bce34cf386df7feaf5621017a32a5c20692d0247f74e5f243a7879bb3fcef2f397d951abc0a2aba90efcb02dab490da9fb15c5c94cdaf84ae67d0834520462564902655aabc369579fac0d34aa02603725df53c2598aad8e75fa6811a8ca281298f845f49a49be2a8573b4209ef120bedd84a3e55e77214aeec0008bee0c3679b003ede3e1bfadb35347a3e4d70f1fd925d6affc63b6f85a2746857b3035a3affec5f5cb2d0cd7a5ca4e130ae22bff001013785249c81883f6b88d3a5586c35cf640d2c441aa910933b5a589ac62d0bc758aebdee3757016b2a3ed5c0a9b7ea0fff39ebbd4ea7d7198a468596eac2518d3373a6c5049e8709fcd3d3224bbca633b10fd56d113bcc5bc9f95407d15a92a2f49989cbc1dc2b4c7ecf681f41a53dbfd712db5ba9bd34915104a606e241698846db60f604724fff5886317639bc0d4b809a4ff8bc93173c6cbe62a56b3b021dfa6ceea88087ebb0c809bbc28814cd3f3abf857261c19e1b1ba831863886346d6efdd69c5fb1b1bdfdb6ee70df57e71f9a09b52b72a3f6f77c0eafe4d1c1a7a7e6b53b5b4ebc71ae8a5646f49a8a693bb9c9d0eb9bf7b6a19e6844244d7fb69c9bdc668c34b762050f0258e258814546e75cbe058aa206b3ceba1714aa1a6069dc136da0e9d87bbc32fb700ccd6b7ed28b12e2387ccddcea05f0e949ef7a682a0e27cb5fc23c0a27cdda6d67748bc97fdf59fcdeb55bae684753ee0c07f1732a54c7f6e11e92519da34572e2f616487a4e752d17680667ed99c1e9ee34826264f64a6c7ad2bea5dd56fbb9c1bd82763f586c4e24ab733d3f2adb543c223220f06b2604a15829f644e79cf213db3b67d151c9a45b9f7f3641d1c984ed674b1b5f105f3ef957530545a3b65c2e7568c0b10388bae1c61942a1890091a201b9f6997bf79d83daf7525ec70053cf2bf72537cd3b60f791e4356c6e5da0e61b9efdc631f5ef689673df15472083d0c6cea84620fa250a27165fb941520c48f4636f1d9126b1a6779f50f3b4d778f7d712b560a8bb51899bc40eb0377148e1fecbfddb3d8ad81ea7026f50535ca4eda4297954896ad99c2d3c99ae08fd888f26648ccbb6647d995f3e9a19f01bf946783cc0d838800b118a2f268cf7fce0381002dda1290b64656f6a71912c6f8292a61e92629ee107bb22a9d82f24db91a4830f10a9b2fe3253c2327d3a13fdfea0f9c866d2ff409316dd2485bf3d3ba4c46e6dde5b6bda946638cbcbb4113ae9c693a50af272ebbae7b78ce5574949bc3e6fdef0078d637fbf5315199a27bb76ca5f0f057733caef5a16f133be1c2aa5be0b2e1420a4bce4e07e7c94fe76291f29fbe8dd3785b6685029358ffabe79a6bb56fb3c1643f79685bcd9d45c702fc3eca0dc820a27475124496e96cd0163bc4ab97eba9c16e316a0450c7299067d65e26b6707b6a50d7674165ea30eb99781f16d5bc61430eff60d538f42a8b161dfe0116bab74277569083b66f169d3072fa461d9a69deba521f4ea06ec58886808ada38ed569b30c44e0324b54778216b8710c0e48a08a6940caf72dd0a5099143052f4d8eef02afdde7af709ac58e010a05916df3ba99f622b2a92ec22905af1e9bdbb7e72cd198f2fc6da0b96576fb291e48f609003cde668ca65c6a3c52030b7ac1e51e4973dc872a32915543757bf899fd7fff709d386c47840d351b5b0f3e80fa730065e94918835f", 0x1000}, {&(0x7f00000009c0)="66c8fa1787741648ee97c3b0bfa42f7a32b01ba81c2316ac409ffed85c9ffe7a5e5c01d2c4a59775fe01c4cb2b1b9bcc5ece5533e742dfb688d776dba7847b79e1f7a6648181682d38ac94760de8f574eb2e3c6748c016a1e70f56fa1e24b24984fbbeaad34481893c9ad91ce1a78c5aa6414bff06b6173a4e583c2fbcb9f9b623c9d0490679a16a12f48c2aece3a29ca7d426035c9b8662d20a63066d0691dbd9a292216a69bc18455380483c2649898be08748834251452b3aa507ade1", 0xbe}, {&(0x7f0000000a80)="ba25e5e82f9db858113835fe6167df31e5d4f88dcf3cda59a7e1449989367e8c8e17e4a78f89d18fd148a62f495cb0cb6941741cf2616352ffb1314e496c09cc7357ffd3aceed9ce6b407daf504f2b69d0a1b1c0aa2d7e08bad952ab674c8986c47c6d5a17fa141e3aa31ebd2b72b899a119d3cc31d3ab0ea8c8f11fe11d4f5ae88873143f1556ff5a44bb575923197aef0b17cf5f6a5fa0b2ef14e4a04277ef3364d5f8bd43fd2de5dea5dbb6f7f80fb9b3bfaa4aafc78bb084eb", 0xbb}, {&(0x7f0000000b40)="4f3e5a5c09fd96b98571b351326edd75c92c92bda12fb3b46e80580f206b00404a87b0563e551871b7619b93c201705afd493a8d3a817332d6153040babd8984a318b35c930f2ca95ce8ee31d15b99f2b3cd2844222e938cbd72220c1e7d1630adbb56b4fb", 0x65}, {&(0x7f0000000bc0)="9add857be311220e91b60724951f5be9d7dc18c09280258edfbaf7755a6a4b79ae5f541debf5d3e3f7782e33d223769aae64d6069f04327a1df00890dfcbcacf09a1377e459840de52c4b6c5d9c887e81bfd195d91162a49f0bcc7fc0f1d126cc9b1d31bace13438a4ef", 0x6a}, {&(0x7f0000000c40)="b5f7c7f40eb215bce8a35c3fb70fe27f42e9229f4476b24d37769fd489cfbda9a04e0cf11bd4f03dcce3b6027bb572566cbb868350e125c58d754f1718011c9c28b13de5d8983cf98bc70d1562f1420d8a6305b1351d9bb905a49678e935bf72df92a69dd9875948aaea", 0x6a}, {&(0x7f0000000cc0)="950d47cd354be454b8b45f51ca19d69e3010fdbef4a89216e3c19737476e0018", 0x20}, {&(0x7f0000000dc0)="6af1f2146c350c2e278416994869f9d24a632adbffe90621405886461890152392e1c62840c55393f55d1412c861b428438255e1b3cfbc00a5805890fd81c5c734e958b70ba53767bce73fd50294e1fc22ed64d8599a0ce3fade608932c915d15044ddbd701672ed8ceaa5374674a6a088303d833a04ce2d03d2ccdd2f7ea5adbcc7c2b4cb74e2e78081fd6553ad8ee278b221f4aacdccc27e6c2789220720135582250ea924ec30f22ae0eba1e174334e13704087b757fbf0cd8e7e953134685c04259cc57cfa2f97963d471f67397b6b3118a133651b94bd4ea8198836bb6025f2d7b48a63e0d6b43e27", 0xeb}, {&(0x7f0000001180)="73178d1c0181f4f62f047f4010d6b6163cee6f6a59c8f23e4b9b5474e869b54b76e17f7e279221c821a38d8737a4829a89b48183a1a280f371a168bcd41a87b7728e5f5d201c489c739b68c33518d19b4c05ccdc9f15640e5c2ba4efd751b42af03593ef780b874a9862a989c905bceb33429d53d7e9f142f477925eddf08298c4801df5e66438a747f28bae1e6acac5252e9d15e29b89fce864234aefc8a0c127f7d4e08eea384e79d8b8ee20852fe0709e9772587eecc3b36e0341c405676874cbd6d82f4a", 0xc6}], 0xa, &(0x7f00000029c0)=[{0x98, 0x1ff, 0x2e40, "ad51692a169dafc2b7392088d211fcec90d42e10ec7f3a9a86d6761bfbad1a3b4077dbcde1f5c547ee12067909c641e4a5a638d0148121dd52412889e489bc077846112944cd8625cd2f3e0a0b930b05d717e4d84dffb076caad67238d088b98d2fd3e3f468cdb3afb83bf73f36233481dcdf8fab166bed7a74c7fd52c926b019c54"}, {0x58, 0x113, 0x64b9, "a87af21dc3dc364552cc7edb9f84e18d78bc57c68a2ea0634e25e5068d007eb2e9db4915b8eae4240913aee712ffbc0fa4fefbdae7e8c231332c7a4e721f6ac44e58b9e80aa4a3"}, {0xf0, 0x119, 0x80, "86e195a02df588c4c16dc185d630d786d09769e2a14d38307e461c1bb6ecbbc369b2aeef33bc8780da32266d6ee06b877c7e6dfde37bde415ce7dc4f94c6c76073bcaf92e9e58e4715b8eece1ca2c5080d3a5a3a087ee74e0f255cfb2fd5ea0992d62bfbf46cc3bfc675769d54c944bfcf4202f7d24c1b5702979a0e302fd082d2477b6f8b46cfdd0329d354a6a9bffeed91fc8deea66471b6e3e565cb17beacfea3ad38d8b6854abfda9cd6ae876230a1d3680c9145652b5d3bc85c53c386f4164692ab45eb91c8adfd59c71703569960e44ec1d222fdd8d966892ea3"}, {0x90, 0x3a, 0x200, "a10d44331b04ab189a649e1d0193cd8031462b1135cfd2ab845ed7e1f557abb65719dea5c8c1908e402f6a5ea6e9e1bb075ec0986ec873cbfd62f647d324e6fdb19c3b037fef9302b6f460cd5afd82acaf78480908f7dd54ec9fc95dc5833c063930c86a39cd1541382caacf1819c5fee5ac2a474c08657977107b"}, {0xa0, 0x0, 0x3, "46dcccb02a9764af3c00a1545d02a5d3cfd7779528fa589fa6950355778a6aac0b1dc0a4b0e333fba925cda5541f24816fe1ea37dabb73f1523694767730edaba7afbd65e5ceb72f5ab508c67249be2692b5ffa841cb183692b712946a68475b67599a9dd8ee94925bbbb53f30d08b6152b0d654d89f2bda9c0d1d81984d5aec62ec1b73537762394bdc14"}, {0xa8, 0x0, 0x100, "1f2d6bf0039add34d1fc59dd49c4c9473a0d2747242991f79ec032417ee855ca5e0bc2f50fc7c1955f3f4a58a3bce1b64ddb6bdc3894e4c49bf71224ed8edd9edd22fe8d2afcfb2197b3cd5750963cf6446cde8ba5c2f465ed01b030aa9b22ceccd7c4a0de876ca6320177238f3611e0f21d6c77a065a23701b47701a03562d987976cc3817c87847013b43b5ef31496f73c1a85d7"}, {0x48, 0x119, 0x5, "6160751ce0386ce35d43ed412334eaf77135f57b6f3985a39bd32c1c8192b84f3c10caac9c1d74cf3ce8e612f0d775cfea44c2"}, {0x1010, 0x0, 0x80, "db6de5535d1fd92b99b9680325310b11aec4e5d42d1981007fd4647db225042098191700b03aefd126d403984ce85f004d42d3a9a2b072d11c61d6a69025c0e0d15f0b5bf37ff8b810d127ebbeb5c489dadecca38b302dbfcde82d4ac3033df1b2206eb34352484757d9a129f7b6fcbe3d88f37cbbdeb6cc0e5c422633cd82a003d5f414d839c48941fddcd30ab6c241bfebcb8d2c73c0a65be5e52d3ea0caeaef8c980827c64153745201de3a81a30b04562ac3a6e295ee7030f4cf8e790b918f4a93ddf3bcc0568b109004bf14cc8814b6600b2f8d36a6375190888a394a88ae6207ec5435eb57959f89995f72f94d42e3e7a0c006ad3d72d2d2e1bcb5ea676c9dc943e36981850386a096b182954add8c50184e0744a6d0eed98c849413f548897f59c57f501676f70452295ad4c1867ee8ce2f0bf0f897981dc1bedf9d5fa98f0decdf3467856586c91d01f77e5b7eaa4ea0ee4f3baef740a2b34c10659addb37ef77e283e4b406635883726ef59640697d0ec8e2e5d705350db0196d39dbe7e1d12a927cfb966eb9014228daacc65cc1c2f21ff81e8b3d3f47a943df7412914b62999ef68d06d1c7a456c89f96da7d043e6e493a279e759169dd64da5919ae2f407e6a570c0ea6b528c835bd05b28cc41d74ad147661980767e067044772437842de2f42d142da3f8c28a015dd9bec042fa09c0ad8cbc38d78b4dd6749983a4bc6f382cca2ebafa5742f570f0485a8133c07ffeee59e53fda7a952455137e3eecc6352f3fb1892e31c6cda7c9fdedb9be75d535b9d5ba11cb306faaec8d11c28eb27bcc2965c8d38103d4aeb6132e94d3d0d862e2759a918b40958c2f5ac863fdacbfc77ad5686043c8e55822145fc387ab11ff28bd20a5e3e8ad3b4788727c06480bdc5f553173eb9cc3619720df9227c0c21bf8eb1b3c912039e36e7c2c712810af1ab891badbbeb23058c6d21ff6b8415ac7ae36b89b673e48a97bab8d158386382cdbfa5388830d54d20be2198d5eb0e69c717e1c2d92865a05fcd4301de019100f5b8963f5538134c9b10362efc5b1a0a39a89fa13d0376354ec4c6657c86ac14b1322debe16120cf1e179efad686352ce1a3a5fafcae6bb00028093ed5f277c3f557a6a7544998e61ac69cade491c536bd6770319b7bb001730785ff5a612aac08c4f7543aa2aa368f72e71f9634eb828099c389ab53eb9be1523b0f8d7b73a5ae7e5fc3a283cc32ad70ce7187b4cb4046e4bc341ecc75cf84d6a9dde1c4d2b61169eb524f80d4382fdcd065b4b3653fcd5f7ee4e35a97c61c040afed7f07f42aa15e71e4599317b73eec267a11165feac9b0d15d8e0ac395f3a3859dee36699812ef9cee239e653702e0b125e66f1567894b4da36485a3276fca60379f07d7b656d86aac41b51404d162a04d4c021991f70e5c5870e8bf2c0adb1818195ea1097307a575583cc15cc2941ca93dacfe63c5fb7bf45bec5fb1837b5be4b54e08c28e05a6b23c4d418c5c2a4cd4c4a9f8c4a66efae0f34a0ad3d8d0a14f0b2c108180031afbdc41bc5df1ef38a2f0b0d3574d49874ccff80018027ad32e689b7b8257c49690ddaaaeaa0770a4e4b857b528b3cc25d6b5bd60183d564ad4dfb17cf4b5f87af408ba6e26f63b245c54f182e437d0b0805567b72f0f0f90940dc6027c619dcb6f5209583274efd483be5769d7a03bf0fc25ef204712064f2427d0dedac0311015257363e5aa52660d49ff369256329580d7d0daacbf755cb86df14c74bcbbbf393f28e63a484f5c88f76223d0a17115fccc7a988281fed3c95efb1dd223b2e91a0aa04085ff2ad1d05a73254f3f2ca20db3a0e63c0750aa9f2f76d9d95e1884ff02b0be6b949d08b9959cea7a40aa32383896523e608c482deed5b9534e09644e622813bcd73bc06601accfaa0b7a17eb323f96a9a95746000db1fbe7792b079d5edbeae291f2283c91ba6996bdb673607698abb12a9a5d030c35970aa21d426970441e0d82083594f0331d526bb81131af08d29f9e5630cb6efeb20f34ac145baaf8d0af5e8008f3e3c6ef0c189a3881ad0cc86e5625e8ac3af8b251bd9c761839e819f853f91fcb71dbd54c268473fddc826cb1504831835a74614c300b578d8d1a53d87ac5d0a7efc0ed216caa09f4e2bc8aa77bf73ddb8fec8cc42f13566e90e432d66ea878e4e0bee6e782f40f7825ce36342985c8c007c40c383fdc1bc5ac19d7e91cb975900f44dd6325abbbe885a5d72d35f5d5a8c16c524153ab5673ed4d9b24a001da95300767b062aa61d53621551e97ef53d9c4a2b543b2b1ef6f28f39b583dc50084ad0c14c0e2f520638abe8d6d5eedd6dd8a9a7df89b6469afadb82507dc776f22ad04fa3d799dfe36b37a18f7de235741c000b49d5686b3ee736c65c38ed6f9207b4256ff58bcf9e353ab11d22a32ae718f5f4946d1ae2a152b5cb6cfdefa0aa004ef21661ee2732cd59900574e9eceff7deecf8a44a0787bb74ba862ec74a48575dc59981ce18cacf4444a62e70a5ade6df23d4fbe381a5cfe3beeff97507afb33f9c42d001f0f7b5db02b45ddbecda0b5be98a718930a35ec88b3e086909211bf3e56636ad45cf39686c5975e7872e3825bb99a1ee4e4fb116cdf1f7d927dcc0ae53df4b268a723ee86cf1c2273cb38914dda8a634cc56c7577a6554869c0ae4de9f2f46f54bea3100e30a2a8e7642ffb86e572d966f52213482a210a67a76b7a7515bea2cd9ca24600f6869424a55df766584847deeb605fc737ef329e8959ed8fabc0186e71e62d09160f1ad5d707d27729cf2b5f5958bf3e8ea3c4526e402bf8f507fd440fa0aed60de16a3cfe16d69bfac384604ce370f4a7835f8432be329a413b4356d128848aea46b91c3f138427ec8d44313c37a5c5f4a9e3effd3ea55dff55e9f7b9c768c7a945247ffcb5f4e54a81c97738486377a87f3ffd8a3e7b8a0bbf2b8c90e6b7583a0328b813ec86208b876ec262ea0ee95e3f5d2f2062a46f7c254528d9c7b79b135b17ba6e0db997aa6d0709d63707215d3ec59b58abf677345c7f73c4eb3aababd0da1029c872592131d18b1a6abce8f84c5c1e787474d9e90a1e944f7ac8eb766016df0f69d8ccb66869f9418aefe12497886eb9d5655f17bbf3a9b32182b5e5cedf86784efba2d35d7108dd99dac86254d41b598413e6380bc54cc3e3164cabed909b30f8dba9f1906b66f4bd59d3dde959d95eab1bd1d974608297005e88eb85a6b7c5f2bfe63897c1f6444595e94e791cb23dbb56da2744493e1490e2b7971edb92608c9eefa3d004140ce4241f96873f2f2001a4154b69643da30ee264cef71e0dfc072c4b154f5fa40748325fbb2678cd3e88c9dfb8a868fb6e562e584c4549b80e8e54e1bf3b5d5f84d703a69aaaab92b6a1077dc4ab8c178434e733663afc923b0d6a8f1f4def89a8b074ee8c32606d21e906c9bc8c062e7eb0f1827f56c5cf01facf2e7308ef038f60e6a70bf3f294ac1a4e16c069d0101d2f11befe470b53a74a233fe97b07b9152998290a2d389f34c537ed9743b22fabeda80a6b0b3c394b540af8591171ba6ed72c416eb6543807aa6ef067945e08083abd4f59710efe365612741a21534ce3f6c795781e233010b2826aa7500632dd714fabf9684ef3ba0f337faa53a4a396d3ce715a5c714ad38c8593f6a11514b4babb310001c33e45f69d9fd9d0c9b020140389e72e7b50cb2ea26d8758a631cc8cd21da67543b8e1c2b0b66dfdd9a532141c2302303547f7b4eb5437a9321727ed9eacebbf29a747aa8751ff8e22c560e7ac90b3a53887d1b798754e4ada80706009aef1b5ea745aa80a91502b4e68188d9a4fc2dd86e631a66a4b54b830c8cb46fbfa0322ae60a166b2f983c772a74725506efcc3e263ff9ec2589c69eecca450d444f9e53e6267a71f591f68cecc9968d6a057c72ab4adbf2df40378a5c03536c2a2a1859664a1e0772458d08d9f92f71ce2e7e1e0c7d49cb52a2f0dca066d65abac6457a59c7e0c5556c71858e3ccb839b100cd84a878cdf66b8a6f9f6787ad207a5eebf8a142ae35762461080ad10d8e991b59da22e961c876143a5261b07f9dee0e8de641438a15da05484fea7662762097c3288173379dd7fab73bee3615cbb441ddc395d395a38f253cbd3ffb4b0c35332bee49a9ecbfd3bb63cbc5d3424c7b88d1b2358efe03adc5aeeee2c8a3c0c5d4698228fc2487c33ab927bdbf46e5e6950c95947486882987b218b5a0ceed96a5aeb56402a8e477a410dff6dc2f58b6a9f8561e71692ee1a68cf2977d193e60765a525f4c6e71dce626964d7d8aeb55f71d962caf7ceda1fcf37c35211bdecd969319437feff7378e28e0abcea4b61a29f2358812f7db9fa537c7e030068eb5da9df6d962b6f9ec99794704d175c2a5bd3c06cffd83c6507dfc2a0e3eb3ee8e31b323004cb19e9c0a826911458e5de70b29571179fcd5e297678636577815150d32bef7f3c6f4bc2a0c7b2c5cc50d6f89e5b7e290a7b6472b9e5bd1c104872610b2279621592999303b5072f9b77d0c37f7693440468c99a38414ecd9d6cc33a904227e63306c8a056bdfbb6e9bc1663a182264ebaddaf5c0135f59d2db6ae717cb538d495fdabfd3b9c93fa23f7bd855ce56fd0f89fae305c6d53fde88c00c5ce18028d60adf7c2c800c63f886c72f1661cead085600c207348eaeda18daad327d04c8d219c8415a2cbc487b1c16e1f044f4bbaa31e97bff01d028d01f12b2de0c563426d550780893036b30044a889b18005e81811019556746e16ca7151a6ce7f1b48f2b77cac922bd5f4501568f13c717c4e1c3d6f76c9821fc09617044c9ebf12bae2f2604ef626ef39c0225796db2cf3c03481cbcd482ef48e495770d3c0d8d2faf871241b7ca06e27fe27fe51109546a4557cf4dfb39452180875099661119529508bda0d3f6e5c56c76c5dbc190456608790b72d35555561de4bb58296299969c8884d4acfc01956f9e8fabc5da602722ecef00fb90f9c48aae75ae034418ffe9cf5cb547d18ba9822a0349dd0f160e26d9b8a42b1b62d406b84b9c99998acbd18f193a7c2ef24ef5c0ff70b9c812784e5a4350f372e25c1668b2bb8fa5a9f6638ea88d8bdef8ac5829d6bbab342bc79e54b7f604fb2b80846e65c1e2ed784cccf25df63fecb5c36c57fd0c380313a0317ccc74bd4557de7b24ceec232d0b96b4d8fb64204d43f0a0bf7c9a37fe73042389cecc3cb6429efa2bb8ff17638c31f3fd35b5361c86c1bda73a354a43dd8ab275d7903de1d945966d70b098340aa01ce4f3dacf644a8bafde6f5bc2be23924f6aea5508592d3d3d818cd30e7f87392cfd35357e4e81b11c2b53453de1442a3d52d0b07307cec39af6c4a05eed7182804b85203b4c02f27c08bbaca66c7859457568003a5cbe65804e5ead4dff8d7a3f9364be100bd6d06fc71f85b4bbfd7578ab84d94ddb88c52a60a8163b0d555bd8291a160abdb1849c9141088ae5a2b87f5e72ae53611ed6341835329c2b5d01d27dd1e377105e23064c9e7b22b09a80a2ccb4652bce9b90db4705308a3ccbe6b9f9be26a0798dd3fb9106bf3117e8b5c89d53fb65f076140fb2715aa78d339ada7301d75f3f2272a344b3541817c20eb303168a1d7cfef369d2c2a71c3bf76cb6293fa1b2fb411e46edfd8478b0f9eb64f2db6072f16153ed20233947b4ead1c1766fdab7774dc94062faf985ddbc8a8149ba0ab86e96664794399053cb10f3b15094877a79ea4da519dbd6aab358b6"}, {0x78, 0x111, 0x7ff, "02163bf620212adc452a1f3d926596f34a0537136661f3b52b1f48e74e5299fefd8031d64f71f763b90c6ef19c347848c72916a703813c331140444ca2e58c87dc14ba80df0aa00137611341b33a83da8a22fcffd9e565db52e83814ac7c6c10bb"}, {0x110, 0x101, 0x8000, "9db51a40fd49b29883d6a43cae4c9664da0e4c44712adfda5d9cce3de56e1d8fd255d1ee916a06d28bbfa7e10905964290638f0111f95577d3406a4b67dffaab30db28e8829efde60ad9bc4314da20b28347adc45f56fbaeb6e1011269bb5a38bbb90d5b9042ab91f91647f5f962125d120faf87b7fff0273f30540e82c983d33056c36989e0d26954be80bb16ca740ab454749acd2b68e5a30d1d61ea2864dfe1530e784c571f95235e5fab6919389fc4cb92932980848694187d1e08715d2a2c788fecceadf338a4130ced285a6b5b621fb5c4cee76462a9f5fd44efbde7b1c5fb2a02f0dd4f163e458aef60e4af12cf2d7a173f483307d5"}], 0x1598, 0x4000040}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r3}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(r8, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000fcffffffbf298000f8ffffff0000000000000000850000001bf2ff00dbf50e62095d2ca7b86a37beaf6ce0af00000000000000009500ddffffbf0000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r6}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0x6, &(0x7f0000000980)=@raw=[@exit={0x95}, @jmp={0x5, 0x80000000000000, 0x4, 0x5, 0x4, 0xffffffff, 0xffffffffffffffff}, @exit={0x95}], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x10000, 0x0, [], r9}, 0x48) 2018/03/30 22:45:32 executing program 3: perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x200000400, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000002c80)={&(0x7f0000002480)=@llc, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002580)=""/225, 0xe1}, {&(0x7f0000002680)=""/38, 0x26}, {&(0x7f00000026c0)=""/196, 0xc4}, {&(0x7f00000027c0)=""/133, 0x85}, {&(0x7f0000002880)=""/167, 0xa7}, {&(0x7f0000002940)=""/237, 0xed}, {&(0x7f0000002a40)=""/239, 0xef}], 0x7, &(0x7f0000002bc0)=""/155, 0x9b, 0x100000000}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='vxfs\x00', 0x2000000, &(0x7f0000000180)="5ea54943a69d057f52244d6a38c667023d677952133fde62dfc52033032369") mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00007fc000)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:45:32 executing program 4: socketpair(0x5, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x8, 0x80000001, 0x4, 0xfff, 0x18, r0, 0xffffffff}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x6, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r1, &(0x7f0000000180), &(0x7f0000000300)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={r1, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) 2018/03/30 22:45:32 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbd") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:32 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x10, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2649.426571] devpts: called with bogus options [ 2649.441697] devpts: called with bogus options [ 2649.443462] FAULT_INJECTION: forcing a failure. [ 2649.443462] name failslab, interval 1, probability 0, space 0, times 0 [ 2649.457701] CPU: 0 PID: 5727 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2649.464901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2649.474256] Call Trace: [ 2649.476851] dump_stack+0x194/0x24d [ 2649.480488] ? arch_local_irq_restore+0x53/0x53 [ 2649.485176] should_fail+0x8c0/0xa40 [ 2649.488892] ? perf_trace_lock_acquire+0xe3/0x980 [ 2649.493735] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2649.498837] ? perf_trace_lock+0x900/0x900 [ 2649.503056] ? mark_held_locks+0xaf/0x100 [ 2649.507185] ? __raw_spin_lock_init+0x1c/0x100 [ 2649.511752] ? find_held_lock+0x35/0x1d0 [ 2649.515798] ? __lock_is_held+0xb6/0x140 [ 2649.519853] ? check_same_owner+0x320/0x320 [ 2649.524893] ? d_alloc+0x269/0x340 [ 2649.528438] ? rcu_note_context_switch+0x710/0x710 [ 2649.533367] should_failslab+0xec/0x120 [ 2649.537338] kmem_cache_alloc+0x47/0x760 [ 2649.541384] ? d_drop+0x51/0x60 [ 2649.544652] ? rpc_i_callback+0x30/0x30 [ 2649.548609] rpc_alloc_inode+0x1a/0x20 [ 2649.552479] alloc_inode+0x65/0x180 [ 2649.556093] new_inode_pseudo+0x69/0x190 [ 2649.560139] ? prune_icache_sb+0x1a0/0x1a0 [ 2649.564364] ? do_raw_spin_trylock+0x190/0x190 [ 2649.568926] ? d_add+0xa70/0xa70 [ 2649.572295] new_inode+0x1c/0x40 [ 2649.575648] rpc_get_inode+0x20/0x1e0 [ 2649.579432] __rpc_create_common+0x5d/0x1d0 [ 2649.583733] rpc_populate.constprop.15+0x1ad/0x340 [ 2649.588660] rpc_fill_super+0x379/0xae0 [ 2649.592635] ? cap_capable+0x1b5/0x230 [ 2649.596521] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2649.601715] ? security_capable+0x8e/0xc0 [ 2649.605852] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2649.611026] ? ns_capable_common+0xcf/0x160 [ 2649.615329] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2649.620498] mount_ns+0xc4/0x190 [ 2649.623847] rpc_mount+0x9e/0xd0 [ 2649.627194] mount_fs+0x66/0x2d0 [ 2649.630548] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2649.635113] ? may_umount+0xa0/0xa0 [ 2649.638720] ? _raw_read_unlock+0x22/0x30 [ 2649.642847] ? __get_fs_type+0x8a/0xc0 [ 2649.646717] do_mount+0xea4/0x2bb0 [ 2649.650234] ? __might_fault+0x110/0x1d0 [ 2649.654276] ? copy_mount_string+0x40/0x40 [ 2649.658492] ? __check_object_size+0x8b/0x530 [ 2649.662974] ? __might_sleep+0x95/0x190 [ 2649.666936] ? kasan_check_write+0x14/0x20 [ 2649.671152] ? _copy_from_user+0x99/0x110 [ 2649.675282] ? memdup_user+0x5e/0x90 [ 2649.678973] ? copy_mount_options+0x1f7/0x2e0 [ 2649.683448] SyS_mount+0xab/0x120 [ 2649.686886] ? copy_mnt_ns+0xb30/0xb30 [ 2649.690851] do_syscall_64+0x281/0x940 [ 2649.694735] ? vmalloc_sync_all+0x30/0x30 [ 2649.698862] ? _raw_spin_unlock_irq+0x27/0x70 [ 2649.703337] ? finish_task_switch+0x1c1/0x7e0 [ 2649.707811] ? syscall_return_slowpath+0x550/0x550 [ 2649.712721] ? syscall_return_slowpath+0x2ac/0x550 [ 2649.717628] ? prepare_exit_to_usermode+0x350/0x350 [ 2649.722623] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2649.727968] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2649.732796] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2649.737962] RIP: 0033:0x454e79 [ 2649.741136] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2649.748824] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2649.756070] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2649.763321] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2649.770569] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/30 22:45:32 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbd") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@ldst={0x0, 0x3, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0x401, 0xfffffffffffffddb, &(0x7f0000000100)=""/202}, 0x48) [ 2649.777816] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000044 [ 2649.785175] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfsd4_cb [ 2649.791611] devpts: called with bogus options [ 2649.800878] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 2649.847949] xprt_adjust_timeout: rq_timeout = 0! [ 2649.874276] xprt_adjust_timeout: rq_timeout = 0! [ 2650.116836] devpts: called with bogus options 2018/03/30 22:45:34 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x5, 0x3, 0x1, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002100)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000089c0)={&(0x7f0000007fc0)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000008800)=[{&(0x7f0000008040)=""/253, 0xfd}, {&(0x7f0000008140)=""/195, 0xc3}, {&(0x7f0000008240)=""/136, 0x88}, {&(0x7f0000008300)=""/159, 0x9f}, {&(0x7f00000083c0)=""/93, 0x5d}, {&(0x7f0000008440)=""/209, 0xd1}, {&(0x7f0000008540)=""/92, 0x5c}, {&(0x7f00000085c0)=""/195, 0xc3}, {&(0x7f00000086c0)=""/120, 0x78}, {&(0x7f0000008740)=""/143, 0x8f}], 0xa, &(0x7f00000088c0)=""/249, 0xf9, 0xfffffffffffffffa}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008a00)={0xf, 0xc, &(0x7f0000001b00)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa00000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x37}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0xb, 0x1, 0x0, r1}, @alu={0x4, 0x3, 0x7, 0x8, 0x7, 0x48, 0x11}, @map={0x18, 0x3, 0x1, 0x0, r2}], &(0x7f0000001b80)='syzkaller\x00', 0x4, 0x1000, &(0x7f00000039c0)=""/4096, 0x41100, 0x1, [], r3}, 0x48) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001a00)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r4, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000180)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0xffffffff, 0xd, 0x0, 0xd, 0xc, 0xfffffffffffffffc}, @generic={0x0, 0x8, 0x3, 0x101}, @jmp={0x5, 0x1f, 0x3, 0x1, 0x0, 0xfffffff0, 0xfffffffffffffff0}], {0x95}}, &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r7}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xef, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) socketpair(0x4, 0x800, 0x3800000000000, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000019c0)={&(0x7f0000001940)='./file0\x00', r8}, 0x10) close(r1) close(r5) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/30 22:45:34 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:34 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000023c0)='./file0/file0\x00', 0x1e0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x0, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x0, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x0, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x244, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r0, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) getpid() r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000002380)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000000000000000003d01f0fff0ffffeebc9afb3ece3a190095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r3) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001940)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1c127df7274c9ea1675e02fa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='affs\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc1e56c") r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001a00)={&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002300)={r6, 0x28, &(0x7f0000001a40)}, 0x10) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/30 22:45:34 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x0, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0x10, &(0x7f0000000700)=ANY=[@ANYBLOB="2e000000ff0000e2fff8ffffff55f60200f0ffff02000000000000000007520000f1ffbf8f2a2443a86af9f2ffff0000000000000000bdbf88000800000000000000000000008500000008000000000900000000000000149a767e7007fe246e8070e22e9aadb45d9241f4792bdf3e5b407424fd085b2c8e23bb41c6c18622e211fb26c8343664f4da2bf7ad2b1aea2cfb979d9cd9d9fc816c9ac19b7ad9482b18b40571b3c21b293ec10533c15906a2d09cfeeff996c254f03d829245be8042d8a6e6db051ff47429e8f991c9543ac32658e75c3da1aca23ac25b"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x77, &(0x7f0000000480)=""/119, 0x41000, 0x1}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0xb}, 0x2c) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xe, 0x6, 0x2, 0x400, 0x10, r0, 0x800}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000053d45c7df93d39aa4ed6000018100000", @ANYRES32=r1, @ANYBLOB="000000000000000018100000", @ANYRES32=r2, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x40000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='adfs\x00', 0x1000, &(0x7f0000000240)='M') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) gettid() socketpair(0x4, 0x5, 0x17, &(0x7f0000000340)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r2, &(0x7f00000003c0)="c843866397078ba178ec21bf61763bdae92dab1ee0e62f46709d68bce5b618d6128ce58cc2a00b2263f06ea90ee85bd168152723e84440acf52e1e5612fad7d95c00f29fd1f8f1d277908904bb59e1f0296327496ccd548a68e5f8d969c361a93aabf68eb63c55414d326150e286b214baf27fbc03", &(0x7f0000000600)=""/9}, 0x18) sendmsg$kcm(r4, &(0x7f0000000980)={&(0x7f0000000680)=@ethernet={0x306, @random="bc856fec686a"}, 0x80, &(0x7f00000008c0), 0x0, &(0x7f0000000940)}, 0xdef60848a863f218) 2018/03/30 22:45:34 executing program 1 (fault-call:19 fault-nth:69): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:34 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) sendmsg(r1, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000900)="a0", 0x1}], 0x1, &(0x7f0000000a40)}, 0x0) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000001540)=@sco, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/235, 0xeb}], 0x2}, 0x2) socketpair(0x9, 0x1, 0xfe00, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={r0, &(0x7f00000004c0)="636c285f226bec8b2072a0faeba003561032a8f38020e41194edd1d352136f3d63ee7591dc0c2ebfbfece4e919dbc3c3212657afbe85d6a2393910748d41fda994d5ad4fa73ab3076aa0ca974c3a2e08b65c527b79b5bc0539f841757f8c3a3ae55ed14d0f24659da384a993098d1d8d28bc3304186b1833a29295e050b020e4abb71dc2e63ef49f940d4f2b8b771213e0ba6eba5ca41ea7c0eac97c18563ae618888d601aef68e35a7b968b2c9067c9fdb11bf17398d729906317ac35dd54c6e72a656e8e375b8bba33e0c2932ff2bbc4c3014f0c82ac2dd04bcf07", &(0x7f00000005c0)=""/136}, 0x18) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000080)=@sco={0x1f, {0x1, 0x1, 0x25523e76, 0x20, 0x80, 0x5180000000000000}}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000380), 0x0, 0x4}, 0x4008000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x8, 0x1, 0x6, 0x9, 0xf, r1, 0x3ff}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000480)={r3}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) 2018/03/30 22:45:34 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd359") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2651.181059] devpts: called with bogus options [ 2651.196203] devpts: called with bogus options [ 2651.207704] FAULT_INJECTION: forcing a failure. [ 2651.207704] name failslab, interval 1, probability 0, space 0, times 0 [ 2651.211643] devpts: called with bogus options [ 2651.219057] CPU: 1 PID: 5790 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2651.230666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2651.240028] Call Trace: [ 2651.242625] dump_stack+0x194/0x24d [ 2651.246259] ? arch_local_irq_restore+0x53/0x53 [ 2651.250941] should_fail+0x8c0/0xa40 [ 2651.254662] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2651.259771] ? trace_event_raw_event_lock+0x340/0x340 [ 2651.264962] ? __lock_is_held+0xb6/0x140 [ 2651.269027] ? mark_held_locks+0xaf/0x100 [ 2651.273186] ? __raw_spin_lock_init+0x1c/0x100 [ 2651.277778] ? find_held_lock+0x35/0x1d0 [ 2651.281830] ? __lock_is_held+0xb6/0x140 [ 2651.285877] ? check_same_owner+0x320/0x320 [ 2651.290178] ? d_alloc+0x269/0x340 [ 2651.293709] ? rcu_note_context_switch+0x710/0x710 [ 2651.298634] ? lock_release+0xa40/0xa40 [ 2651.302601] should_failslab+0xec/0x120 [ 2651.306590] kmem_cache_alloc+0x47/0x760 [ 2651.310633] ? d_drop+0x51/0x60 [ 2651.313901] ? rpc_i_callback+0x30/0x30 [ 2651.317862] rpc_alloc_inode+0x1a/0x20 [ 2651.321736] alloc_inode+0x65/0x180 [ 2651.325352] new_inode_pseudo+0x69/0x190 [ 2651.329402] ? prune_icache_sb+0x1a0/0x1a0 [ 2651.333628] ? do_raw_spin_trylock+0x190/0x190 [ 2651.338190] ? d_add+0xa70/0xa70 [ 2651.341551] new_inode+0x1c/0x40 [ 2651.344903] rpc_get_inode+0x20/0x1e0 [ 2651.348680] __rpc_create_common+0x5d/0x1d0 [ 2651.352979] rpc_populate.constprop.15+0x1ad/0x340 [ 2651.357900] rpc_fill_super+0x379/0xae0 [ 2651.361871] ? cap_capable+0x1b5/0x230 [ 2651.365743] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2651.370920] ? security_capable+0x8e/0xc0 [ 2651.375060] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2651.380238] ? ns_capable_common+0xcf/0x160 [ 2651.384547] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2651.389724] mount_ns+0xc4/0x190 [ 2651.393072] rpc_mount+0x9e/0xd0 [ 2651.396426] mount_fs+0x66/0x2d0 [ 2651.399776] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2651.404336] ? may_umount+0xa0/0xa0 [ 2651.407946] ? _raw_read_unlock+0x22/0x30 [ 2651.412078] ? __get_fs_type+0x8a/0xc0 [ 2651.415946] do_mount+0xea4/0x2bb0 [ 2651.419463] ? __might_fault+0x110/0x1d0 [ 2651.423502] ? copy_mount_string+0x40/0x40 [ 2651.427712] ? check_same_owner+0x320/0x320 [ 2651.432022] ? __check_object_size+0x8b/0x530 [ 2651.436513] ? __might_sleep+0x95/0x190 [ 2651.440471] ? kasan_check_write+0x14/0x20 [ 2651.444688] ? _copy_from_user+0x99/0x110 [ 2651.448823] ? memdup_user+0x5e/0x90 [ 2651.452512] ? copy_mount_options+0x1f7/0x2e0 [ 2651.456986] SyS_mount+0xab/0x120 [ 2651.460423] ? copy_mnt_ns+0xb30/0xb30 [ 2651.464294] do_syscall_64+0x281/0x940 [ 2651.468172] ? vmalloc_sync_all+0x30/0x30 [ 2651.472303] ? _raw_spin_unlock_irq+0x27/0x70 [ 2651.476782] ? finish_task_switch+0x1c1/0x7e0 [ 2651.481262] ? syscall_return_slowpath+0x550/0x550 [ 2651.486183] ? syscall_return_slowpath+0x2ac/0x550 [ 2651.491102] ? prepare_exit_to_usermode+0x350/0x350 [ 2651.496107] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2651.501448] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2651.506272] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2651.511443] RIP: 0033:0x454e79 [ 2651.514609] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2651.522293] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 2018/03/30 22:45:34 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x0, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:34 executing program 0: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x20000000) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480)="9b7815cd421eecc37df9250ab7496936ab4c75599ff96ba02ed5166be56df09fec2eef35318bf9b1311a", &(0x7f00000006c0)=""/139}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x4, &(0x7f00000003c0)=@raw=[@jmp={0x5, 0x401, 0x4, 0x2, 0x8}, @exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000ac0)='./file1\x00', 0x40) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000001300)={r5}) recvmsg(r4, &(0x7f0000005fc0)={&(0x7f0000003a80)=@hci={0x0, 0x0}, 0x80, &(0x7f0000005f40)=[{&(0x7f0000005d00)=""/195, 0xc3}, {&(0x7f0000003b00)=""/49, 0x31}, {&(0x7f0000005e00)=""/107, 0x6b}, {&(0x7f0000006dc0)=""/4096, 0x1000}, {&(0x7f0000005e80)=""/6, 0x6}, {&(0x7f0000005ec0)=""/112, 0x70}], 0x6, 0x0, 0x0, 0xea0}, 0x10001) bpf$PROG_LOAD(0x5, &(0x7f0000006000)={0xf, 0x10, &(0x7f0000001480)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x98}, @jmp={0x5, 0x27a, 0x0, 0x2, 0x0, 0x2, 0xfffffffffffffffc}, @jmp={0x5, 0x3, 0x7, 0x8, 0x0, 0x40, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3ff}, @call={0x85, 0x0, 0x0, 0x8}, @ldst={0x0, 0x3, 0x0, 0x1, 0x7, 0xfffffffe, 0xfffffffffffffff0}, @exit={0x95}, @exit={0x95}], &(0x7f0000000bc0)='GPL\x00', 0xde9, 0xe2, &(0x7f0000001b80)=""/226, 0x41100, 0x1, [], r6}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001340)={r1}) sendmsg$kcm(r7, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000c00), 0xfffffffffffffff6, 0x0, 0x0, 0x8000}, 0x40011) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000640)='./file1\x00', 0x1) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x103fe, &(0x7f0000444000)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) sendmsg(r1, &(0x7f0000000c40)={&(0x7f0000000b40)=@ipx={0x4, 0x8000, 0x2, "c0040ef6d26b", 0xa13d}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000001380)="0517179bf749253958280283882d8666381d9e111e4d754f98725cc0623a01d588257391432931f8502a28074f088a4fca792336bb2487eaf0a160e50e16fa05fa39652af5db274f393c907bcc94eb915502af3c2202d1e66c27909ef21be3a61481f4c1530eb8ddbce09604b55ae9be722869a4ede677b03cefc1dd4f077bc43f47602b555d2b1b2f34f9b4ebb5c3479d9b74cd1fe1c01c37d423c7028cf8dc32f9d95cd026c686a91d0f11e21e6f7eacc1454f1351082e616297a2eed6992cca1d56ff73580ed079568f062c", 0xcd}, {&(0x7f00000019c0)="834f32493bbbd7eca62c64f95b20472eba2257b7b5b0312bff1e7e32e7c34d20e5b208274842100f83951c9ac9119a1915f745074d49e6ebcd47aa428258b8b4c06d1c75022ea5074c268396d3bdda0b2b566a990c1711f3a9232c118236b4443a322c8a3893b1cb7f6992a02f89f7c05c262e81b737b52c07aed217ddc48848380576e8790725b31a0b171f23eb344fc45e81cdee55ce2dc8b15e040d042feed9e60ad4f501ce1a45d95669da3045df96605928e13226457179668b2af9b5432c379caa4946cc5e8df56bbeca", 0xcd}, {&(0x7f0000000bc0)}, {&(0x7f0000000d40)="ca3ba1ce7f95a0b3f44f7fcaf214537c1f4605668575b6156c13340e4aef656409074f7b3cb59be0efa72070943d351693a43bae42577be5d4bad2cff35031f07915d379fa2b823c2fdf51f08ff48953b0f2d224d9cf2cde9b0ffca29f7d375e1d19ab0a48b2a9cbbff837fefec7ad054f58199fc3fcec1383e3bda4414c1b2732e1ba029aa28205ef07d2b577b729630cf16049e2af693e66e9725ee6", 0x9d}], 0x4, &(0x7f0000001ac0)=[{0xa0, 0x103, 0x8, "c224267854a7b7c46b1d00eddabcf0a79fa5ce92e6d5564e4f1c11e0c22c5f0b420e9aa851729b87e1fc92eb3cca1ec63b0d1f6747060577ff5a9c181f33c66a6f025eb8e2ba94a910848fe406ba103513d94c9941f3bb3d659cc69f256d1b98ca85e68a5e0aef3ea07a78c3d1517b0cdb85ed72e6d5bb68fe140859753d5273f50217e96933aed78c"}], 0xa0, 0x40001}, 0x4000) recvmsg(r0, &(0x7f0000003c40)={&(0x7f0000001500)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000001580)=""/187, 0xbb}, {&(0x7f0000001640)=""/202, 0xca}, {&(0x7f0000001740)=""/97, 0x61}, {&(0x7f00000017c0)=""/142, 0x8e}, {&(0x7f00000029c0)=""/172, 0xac}, {&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000003b40)=""/111, 0x6f}], 0x7, 0x0, 0x0, 0x800}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000003c80)={0xe, 0x9, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@generic={0x10001, 0x9, 0x10001, 0x3}, @ldst={0x3, 0x3, 0x7, 0x3, 0x8, 0x0, 0x8}, @generic={0x0, 0x0, 0x623c7a4d, 0x6006730a}], {0x95}}, &(0x7f0000000980)='GPL\x00', 0x5, 0x84, &(0x7f00000009c0)=""/132, 0x41f00, 0x1, [], r8}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001c80)) mkdir(&(0x7f0000000a80)='./file0\x00', 0x1) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000b00)='affs\x00', 0x104004, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0x12, &(0x7f00000004c0)=@raw=[@exit={0x95}, @jmp={0x5, 0x7f, 0x9, 0x7, 0x0, 0x30, 0x570c72d2c4205df9}, @generic={0x401, 0xffffffffffffffc1, 0x8, 0x1}, @call={0x85, 0x0, 0x0, 0x38}, @ldst={0x1, 0x2, 0x34194f12a387f72c, 0x2, 0x3, 0xfffffffc, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x18}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10001}, @call={0x85, 0x0, 0x0, 0x33}], &(0x7f0000000380)='syzkaller\x00', 0x7fff, 0xd, &(0x7f0000000580)=""/13, 0x40f00, 0x1}, 0x48) recvmsg(r1, &(0x7f0000001240)={&(0x7f0000000e40)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000c80)=""/21, 0x15}, {&(0x7f0000000ec0)=""/105, 0x69}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/5, 0x5}, {&(0x7f0000001040)=""/15, 0xf}, {&(0x7f0000001080)=""/204, 0xcc}], 0x6, &(0x7f0000001200)=""/43, 0x2b, 0x6}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0xf, 0xb, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0xffffffffffffff00}, [@ldst={0x3, 0x0, 0x6, 0xf, 0x7, 0xfffffff8}, @exit={0x95}, @jmp={0x5, 0x8, 0x7, 0xf, 0x1, 0xfffffffe, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}], {0x95}}, &(0x7f0000000680)='syzkaller\x00', 0x304f, 0x41, &(0x7f0000000880)=""/65, 0x41100, 0x1, [], r9}, 0x48) [ 2651.529555] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2651.536806] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2651.544144] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2651.551390] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000045 [ 2651.558733] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfsd4_cb [ 2651.573864] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 2651.708687] devpts: called with bogus options [ 2651.730917] hugetlbfs: Bad mount option: "" [ 2651.770951] devpts: called with bogus options [ 2651.825333] hugetlbfs: Bad mount option: "" [ 2651.846780] devpts: called with bogus options [ 2651.875677] EXT4-fs (sda1): re-mounted. Opts: 2018/03/30 22:45:34 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd359") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:34 executing program 4: socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x8) r1 = gettid() r2 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r1, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r0, 0x2) r3 = perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x7ff, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r1, 0xd, r2, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x1000020, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)='./file1\x00', &(0x7f0000000800)="c69f6354413049c854b175eea5d55e3b5ce5e588cb0b8d72ba1b3f9858cb6846bb7d14d6150c813b7a31afa36684417679f0901c6c91a5b336a5bdc5497e5d0dd12acc995b9af71db0f7aae5ce0d6867a9da4ac0a56bdb286cd2c2e2624afe17cd4e695b765de12902772f754d37b89b90fc50fe3d1a622448ada4a3bb68689f55c6fbb93cbc946c95c77ff85f423ae90f7a6ca0184147cc77430f66aee8f64cadd28f551a347f5167360780e38f3536094467b821fb10b085072e01bbb2216c1c7190c3b444ffcc6fe240110c7c8acd6bed4c9e5985d639d50a851b7c7c18adb6043f0adb7cedbae89d6d75", 0x1000004000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="5c1100002045c2ec6400000000000000303feefcd8ed6d9f798373287f29fd0fdfc6d7eb01040000da2e80a190a763f4ec976684e98d23fc9e39f87515945454b47a04452898d9726587c92418e569e7e23706111a64572699cc934f57d7000000000000000000000000000000"]) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x6) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x3c652686) sendmsg(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/03/30 22:45:34 executing program 1 (fault-call:19 fault-nth:70): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:34 executing program 2: r0 = getpid() socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000002900)) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc377) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f, 0xfffffffffffffffc}, 0xfffffffffffffffe) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000140)=0x6) r3 = gettid() mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) socketpair(0x10, 0x800, 0x5, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = perf_event_open(&(0x7f0000001340)={0x7, 0x70, 0xfffffffffffffff9, 0x9, 0x5, 0xff, 0x0, 0x7fff, 0x0, 0x1, 0x3, 0x6, 0x457, 0x3, 0x5, 0x3, 0x9, 0xb0, 0x40, 0x1, 0x1dc, 0x2, 0x0, 0x8001, 0x1, 0x0, 0x6, 0x4, 0x0, 0xff, 0x9, 0x7fff, 0x100000000, 0x8, 0x7, 0x6ad, 0xffffffffffffff14, 0x0, 0x0, 0x39, 0x4, @perf_config_ext={0x6, 0x80000000}, 0x400, 0x0, 0xffffffffffffff81, 0x3, 0x2, 0x6, 0xb75}, r3, 0x0, r5, 0x8) recvmsg$kcm(r4, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000001140)=""/131, 0x83}], 0x1, &(0x7f0000001240)=""/134, 0x86, 0xfff}, 0x2000) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x0, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002700)='./file2\x00', 0x3) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002a80)) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002680)={&(0x7f0000002640)='./file1\x00', 0x0, 0x8}, 0x10) perf_event_open(&(0x7f0000002980)={0x3, 0x70, 0x1, 0x4, 0x9, 0x8, 0x0, 0x3, 0x80, 0x5, 0x80, 0xfffffffffffffffe, 0x1000, 0x6, 0x9, 0x4, 0x5, 0xb93e, 0x80000001, 0x4, 0x3, 0x4, 0x401, 0x1, 0x4, 0xffffffffffff9bce, 0x5, 0x2, 0x3, 0x5, 0x6, 0x0, 0x4, 0x7f, 0x3, 0x7, 0x4, 0x3, 0x0, 0x1ff, 0x2, @perf_config_ext={0xfffffffffffffffe, 0x7}, 0x0, 0x5, 0x2, 0x5, 0x0, 0x902, 0x8}, r0, 0x6, r1, 0xa) mount(&(0x7f00009f8000)='./file0\x00', &(0x7f0000a3bff8)='./file0\x00', &(0x7f00000026c0)='nfs4\x00', 0x0, &(0x7f000000a000)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x0, 0x0, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x7a52, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r3, 0x5, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000002940)) recvmsg$kcm(r5, &(0x7f0000002600)={0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000013c0)=""/113, 0x71}, {&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000002440)=""/15, 0xf}, {&(0x7f0000002480)=""/227, 0xe3}], 0x4, &(0x7f00000025c0)=""/61, 0x3d, 0x7fffffff}, 0x2001) perf_event_open(&(0x7f0000002780)={0x4, 0x70, 0x9, 0x3, 0x2, 0x0, 0x0, 0x5, 0x40000, 0x4, 0x3, 0x8, 0x0, 0x4, 0x7fffffff, 0x63, 0x3, 0x80, 0x9, 0x468e, 0x10000, 0x11, 0x5, 0xff, 0x20, 0x20, 0x2, 0x40, 0x400, 0x0, 0x5, 0x557, 0x9, 0x9e, 0x3ff, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000002740)}, 0x0, 0x1, 0x4, 0x2, 0x401, 0x6, 0x1f}, r0, 0xc, r6, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002880)={r7, 0x50, &(0x7f0000002800)={0x0, 0x0}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002a00)={&(0x7f0000002a40)='./file0\x00', 0x0, 0x80008}, 0x195) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xc, 0x6, 0x1, 0x2, 0xc, r5, 0xfffffffffffffff8}, 0x2c) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000028c0)=r8, 0x4) 2018/03/30 22:45:34 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001b40)='./file0/file0\x00', 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) r3 = gettid() perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x0, 0x0, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x0, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x0, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x0, 0x6, 0x0, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x244, 0x80000000, 0x82, 0x0, 0x5, 0x3, 0x80000001}, r3, 0xd, r0, 0x8) recvmsg(r1, &(0x7f00000017c0)={&(0x7f00000003c0), 0x80, &(0x7f0000001740)=[{&(0x7f0000000240)=""/12, 0xc}, {&(0x7f0000000440)=""/93, 0x5d}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/196, 0xc4}, {&(0x7f0000001600)=""/47, 0x2f}, {&(0x7f0000001640)=""/244, 0xf4}], 0x6, &(0x7f0000003d40)=""/4096, 0x1000, 0x5}, 0x40010140) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() r5 = perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x0, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x300000001, 0x6, 0x0, 0x0, 0x0, 0x753c, 0x0, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r0, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000003d00)={r2, 0x0, 0x8e, 0x3e, &(0x7f0000003c40)="676782d8d87f16838ada6164d7bc9de678d87bdcc52dd9fa24e4ca364991fa445a34b04a5258a597b1c5543a8b47daf7a74cadfc0fec283ceefbf22f2717bf02c3f2d994c0985b9974dd39b88bf51c72e1f9a1d5d8a863837902c5ecfc62f6980cadf4dd82f08db404084ac1f603036f243903050aab66136c74abc5011a239e7dfeff7996ad405ad9cf018037bf", &(0x7f00000033c0)=""/62, 0x0, 0x1}, 0x28) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000002380)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000000000000000003d01f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r6}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) recvmsg$kcm(r0, &(0x7f0000001f40)={&(0x7f0000000180)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000001c00)=""/185, 0xb9}, {&(0x7f0000001cc0)=""/56, 0x38}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f0000001d00)=""/68, 0x44}, {&(0x7f00000039c0)=""/221, 0xdd}, {&(0x7f0000003ac0)=""/236, 0xec}, {&(0x7f0000002040)=""/192, 0xc0}, {&(0x7f0000001d80)=""/12, 0xc}], 0x8, 0x0, 0x0, 0x3}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r5) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001800)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mkdir(&(0x7f0000002300)='./file0/file0\x00', 0x80) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001940)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1c127df7274c9ea1675e02fa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000"]) mount(&(0x7f0000000340)='./file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='vfat\x00', 0xfffffffffffffffd, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/30 22:45:34 executing program 3: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x4, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001000100180000000800000018000000010000000000000007000000f734f8ff000000000000000000000000437afcfff0ffffff00000000000000009500000000000000"], &(0x7f0000000940)='syzkaller\x00', 0xb9, 0x9, &(0x7f0000000100)=""/9, 0x41f00, 0x1}, 0xfffffcca) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000001c0)=r1, 0x4) socketpair$inet(0x2, 0x2, 0x1f, &(0x7f0000000200)) socketpair(0x2, 0xa, 0x78, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000280)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)) socketpair(0xb, 0xa, 0x1, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r5) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f00000003c0)) r6 = gettid() perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x0, 0x8000, 0xd2, 0x3, 0x0, 0xffffffffc480e593, 0x280, 0x0, 0x3, 0x1, 0x2, 0x80000000000, 0x3d770b37, 0xffffffffffffff01, 0x9, 0x7, 0x92, 0x80000000000000, 0x0, 0x7f, 0x4, 0x5, 0x1f, 0x75, 0x7, 0x0, 0x3, 0x7e00000000, 0x5, 0x1, 0x73, 0x5, 0x4, 0x3, 0x8001, 0x1d6227dec000, 0x0, 0x80, 0x2, @perf_config_ext={0x7, 0xa67}, 0x8000, 0x6, 0x10001, 0x0, 0x8001, 0x2, 0x4}, r6, 0x8, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x8) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000480)) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x400000000008) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x0) mkdir(&(0x7f0000000540)='./file0\x00', 0x42) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={r7, 0x28, &(0x7f0000000700)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={r8, 0x800, 0x10}, 0xc) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000800)={&(0x7f00000007c0)='./file0\x00', r4}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880)={&(0x7f0000000840)='./file0\x00', 0x0, 0x8}, 0x10) 2018/03/30 22:45:34 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x0, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:34 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2651.905558] EXT4-fs (sda1): re-mounted. Opts: [ 2652.000939] devpts: called with bogus options [ 2652.019006] FAULT_INJECTION: forcing a failure. [ 2652.019006] name failslab, interval 1, probability 0, space 0, times 0 [ 2652.030435] CPU: 0 PID: 5844 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2652.032950] devpts: called with bogus options 2018/03/30 22:45:34 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd359") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2652.037620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2652.037626] Call Trace: [ 2652.037648] dump_stack+0x194/0x24d [ 2652.037665] ? arch_local_irq_restore+0x53/0x53 [ 2652.037685] should_fail+0x8c0/0xa40 [ 2652.066219] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2652.071342] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2652.076549] ? __lock_acquire+0x664/0x3e00 [ 2652.080791] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2652.085984] ? find_held_lock+0x35/0x1d0 [ 2652.090047] ? __lock_is_held+0xb6/0x140 [ 2652.094098] ? check_same_owner+0x320/0x320 [ 2652.098398] ? __d_lookup+0x4f4/0x830 [ 2652.102181] ? rcu_note_context_switch+0x710/0x710 [ 2652.107096] should_failslab+0xec/0x120 [ 2652.111053] kmem_cache_alloc+0x47/0x760 [ 2652.115100] __d_alloc+0xc1/0xbd0 [ 2652.118537] ? shrink_dcache_for_umount+0x290/0x290 [ 2652.123538] ? d_alloc_parallel+0x1b40/0x1b40 [ 2652.128022] ? lock_release+0xa40/0xa40 [ 2652.131990] ? mark_held_locks+0xaf/0x100 [ 2652.136643] ? d_lookup+0x133/0x2e0 [ 2652.140342] ? d_lookup+0x1d5/0x2e0 [ 2652.143952] d_alloc+0x8e/0x340 [ 2652.147216] ? __d_alloc+0xbd0/0xbd0 [ 2652.150908] ? full_name_hash+0x9b/0xe0 [ 2652.154869] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2652.160134] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2652.164357] rpc_populate.constprop.15+0xa3/0x340 [ 2652.169185] rpc_fill_super+0x379/0xae0 [ 2652.173164] ? cap_capable+0x1b5/0x230 [ 2652.177047] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2652.182223] ? security_capable+0x8e/0xc0 [ 2652.186359] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2652.191529] ? ns_capable_common+0xcf/0x160 [ 2652.195831] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2652.201002] mount_ns+0xc4/0x190 [ 2652.204364] rpc_mount+0x9e/0xd0 [ 2652.207711] mount_fs+0x66/0x2d0 [ 2652.211063] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2652.215626] ? may_umount+0xa0/0xa0 [ 2652.219231] ? _raw_read_unlock+0x22/0x30 [ 2652.223358] ? __get_fs_type+0x8a/0xc0 [ 2652.227229] do_mount+0xea4/0x2bb0 [ 2652.230756] ? __might_fault+0x110/0x1d0 [ 2652.234808] ? copy_mount_string+0x40/0x40 [ 2652.239025] ? check_same_owner+0x320/0x320 [ 2652.243328] ? __check_object_size+0x8b/0x530 [ 2652.247807] ? __might_sleep+0x95/0x190 [ 2652.251765] ? kasan_check_write+0x14/0x20 [ 2652.255983] ? _copy_from_user+0x99/0x110 [ 2652.260113] ? memdup_user+0x5e/0x90 [ 2652.263808] ? copy_mount_options+0x1f7/0x2e0 [ 2652.268284] SyS_mount+0xab/0x120 [ 2652.271720] ? copy_mnt_ns+0xb30/0xb30 [ 2652.275590] do_syscall_64+0x281/0x940 [ 2652.279463] ? vmalloc_sync_all+0x30/0x30 [ 2652.283592] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 2652.289110] ? syscall_return_slowpath+0x550/0x550 [ 2652.294024] ? syscall_return_slowpath+0x2ac/0x550 [ 2652.298942] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2652.304289] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2652.309115] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2652.314280] RIP: 0033:0x454e79 [ 2652.317458] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2652.325147] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2652.332394] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2652.339642] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/30 22:45:35 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000000)='./file0\x00'}, 0x61) mount(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)="000009b8", 0x804022, &(0x7f0000000180)="236f589bc391ec020c4b1ae3e13cadf71f3cc18f423b0e7684cdbaf5ee05f65c1cc5d617b0c283fd30a4") socketpair(0x0, 0x80003, 0x7ac0, &(0x7f00000001c0)={0x0, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000013c0)={&(0x7f0000001380)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x8080000000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001240)={r0, &(0x7f0000000200), &(0x7f0000001200)="55fe"}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a00)={r0, 0x28, &(0x7f0000000a40)}, 0xfe7b) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001600)={r1, &(0x7f00000014c0)="a2bc1838300e0ba7c3d1f765a491303e61c8322b9b9152a46ee4b2d960c8b6b24c8d6e226842bfc7ff55fe742eaeb1303cca295e3b", &(0x7f0000001740)=""/209}, 0x18) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00000009c0)='devtmpfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='minix\x00', 0x8, 0x0) 2018/03/30 22:45:35 executing program 1 (fault-call:19 fault-nth:71): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:35 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2652.346889] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2652.354136] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000046 [ 2652.362933] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 22:45:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1e, 0x0, 0x3, 0x6, 0x1, r0, 0x6773}, 0x2c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x2, 0x7, 0x8001, 0x10, 0xffffffffffffffff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={0xffffffffffffffff, &(0x7f00000004c0)="a3261c57", &(0x7f0000000500)="cd8249bf39d6176ef7346799ac199e6cf9e7fe02418812a394d9c874384d4ba7bd9d3b261f1a018d54c20e688a5dc8a23babc41d618eab351795754d5fa3ad297aec7e01f2990b", 0x2}, 0x20) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080), 0x1e}], 0x1000000000000020}, 0x8000) sendmsg(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000b00)="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", 0x13f}], 0x1, 0x0, 0x0, 0x80}, 0x20000000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={r0, &(0x7f0000000680), &(0x7f00000006c0)=""/166}, 0x18) mount(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='pstore\x00', 0x4, &(0x7f0000000640)="afb63e3ff55419f9e9572aabeb90d8184a20d3c850fa576f0f0d376978dcd77395a8eb26002ef5146d") mkdir(&(0x7f0000000300)='./file0\x00', 0x60) r2 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r2) r3 = getpid() perf_event_open(&(0x7f0000000340)={0x7, 0x70, 0xfffffffffffffffc, 0x5, 0x6, 0xe804, 0x0, 0x3ff, 0x4000b, 0xb, 0x3ff, 0x5, 0x4, 0x6, 0x73b35af4, 0x0, 0xfffffffffffffffe, 0x6, 0x0, 0x7ff, 0x100, 0x401, 0x4c8f, 0x7, 0x7b95, 0x1, 0xa0, 0x7, 0xfffffffffffffffd, 0x4, 0x5, 0x1, 0x9, 0x80000000000, 0xcb7, 0x3f, 0x73925eb4, 0x7, 0x0, 0x80, 0x3c7912655e46cf25, @perf_config_ext={0xa6ec, 0x4}, 0x2010, 0xb, 0x9, 0x4, 0x3ff, 0x9, 0xfffffffffffffa97}, r3, 0xe, r2, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003700)={&(0x7f0000000280)=@pppoe={0x0, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003400)=""/251, 0xfb}, {&(0x7f0000003500)=""/14, 0xe}, {&(0x7f0000003540)=""/107, 0x6b}, {&(0x7f00000035c0)=""/211, 0xd3}], 0x4, 0x0, 0x0, 0x3ff}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000008c0)={r4}) recvmsg$kcm(r5, &(0x7f0000000a40)={&(0x7f0000000a80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x3c1, &(0x7f0000000a00)=[{&(0x7f0000000980)=""/101, 0x65}], 0x1, 0x0, 0x0, 0x1}, 0x10001) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000001c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r6, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) socketpair(0x10, 0x5, 0x3f, &(0x7f0000000840)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000880)={r4}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000800)) 2018/03/30 22:45:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001, 0x5}, 0x2c) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r0, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={r2, 0x5, 0x8}, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xe, 0x0, 0x7f, 0x3e83, 0x8, r1, 0x80000000}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000240), 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x8, 0x6bcb8e63, 0x1, 0x59ad, 0x12, r0, 0x8001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000180), &(0x7f0000000080)=""/70}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r3, &(0x7f00000006c0)="6b6bed390817205d3541170b758b210a", &(0x7f0000000700)="66d4ebe9657764d136f75da5584977ebd7cd03a3a24672bb21250a"}, 0x20) socketpair(0x2, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r5, 0x50, &(0x7f0000000300)}, 0x10) recvmsg(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000380)}], 0x1, &(0x7f0000000400)=""/97, 0x61, 0xf3c}, 0x10000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r3, &(0x7f00000004c0)="d7b891538aecfb14516e9980684b88098bef1ceab288dff4f3b897dd8856df9b77e4841f57894b62b9854833ddb62534babd40292800b99c0238d3c11f5eff7a73c69e636045e78f68ebfec66fe03ac009c6aa3f60d98f1438fde97ba2aabb65d16e9df22c6848e7d1f795319fd88dd1906b4c2a09f558f182aded1713e0074bf0ca7cadafac712fafd90824480e8d8d6e72db55dc254d55c262cd72da15e9f9cb03b61640e06fa98be5eeab5ba5ff31b766123af7976ce9057423c0952d97931604a9744e9a7f806cd1959f47b1feac27070d42e616763893cdac", &(0x7f00000005c0)=""/98}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000680)='\'bdev\x00') 2018/03/30 22:45:35 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x0, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2652.546077] devpts: called with bogus options [ 2652.669692] devpts: called with bogus options [ 2652.680453] tmpfs: No value for mount option './file0' [ 2652.698245] tmpfs: No value for mount option '#oX›Ã‘ì Kãá<­÷<ÁB;v„ͺõîö\Åְƒý0¤' [ 2652.702099] devpts: called with bogus options [ 2652.730352] FAULT_INJECTION: forcing a failure. [ 2652.730352] name failslab, interval 1, probability 0, space 0, times 0 [ 2652.741682] CPU: 0 PID: 5886 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2652.748874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2652.758232] Call Trace: [ 2652.760826] dump_stack+0x194/0x24d [ 2652.764454] ? arch_local_irq_restore+0x53/0x53 [ 2652.769137] should_fail+0x8c0/0xa40 [ 2652.772866] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2652.777987] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2652.783184] ? __lock_acquire+0x664/0x3e00 [ 2652.787407] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2652.792579] ? find_held_lock+0x35/0x1d0 [ 2652.796624] ? __lock_is_held+0xb6/0x140 [ 2652.800672] ? check_same_owner+0x320/0x320 [ 2652.804975] ? __d_lookup+0x4f4/0x830 [ 2652.808759] ? rcu_note_context_switch+0x710/0x710 [ 2652.813758] should_failslab+0xec/0x120 [ 2652.817723] kmem_cache_alloc+0x47/0x760 [ 2652.821779] __d_alloc+0xc1/0xbd0 [ 2652.825213] ? shrink_dcache_for_umount+0x290/0x290 2018/03/30 22:45:35 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e0063050641") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:35 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0xd69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000004ce00036cca7000000d8c6bb18c29a248c00000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) [ 2652.830220] ? d_alloc_parallel+0x1b40/0x1b40 [ 2652.834721] ? lock_release+0xa40/0xa40 [ 2652.836739] tmpfs: No value for mount option './file0' [ 2652.838698] ? mark_held_locks+0xaf/0x100 [ 2652.838711] ? d_lookup+0x133/0x2e0 [ 2652.838730] ? d_lookup+0x1d5/0x2e0 [ 2652.855377] d_alloc+0x8e/0x340 [ 2652.858662] ? __d_alloc+0xbd0/0xbd0 [ 2652.862382] ? full_name_hash+0x9b/0xe0 [ 2652.866368] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2652.871648] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2652.875895] rpc_populate.constprop.15+0xa3/0x340 [ 2652.880758] rpc_fill_super+0x379/0xae0 [ 2652.884740] ? cap_capable+0x1b5/0x230 [ 2652.888621] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2652.893800] ? security_capable+0x8e/0xc0 [ 2652.897944] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2652.903140] ? ns_capable_common+0xcf/0x160 [ 2652.907470] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2652.912665] mount_ns+0xc4/0x190 [ 2652.916030] rpc_mount+0x9e/0xd0 [ 2652.919395] mount_fs+0x66/0x2d0 [ 2652.922761] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2652.927324] ? may_umount+0xa0/0xa0 [ 2652.930935] ? _raw_read_unlock+0x22/0x30 [ 2652.935067] ? __get_fs_type+0x8a/0xc0 [ 2652.938941] do_mount+0xea4/0x2bb0 [ 2652.942459] ? __might_fault+0x110/0x1d0 [ 2652.946503] ? copy_mount_string+0x40/0x40 [ 2652.950718] ? check_same_owner+0x320/0x320 [ 2652.955023] ? __check_object_size+0x8b/0x530 [ 2652.959505] ? __might_sleep+0x95/0x190 [ 2652.963464] ? kasan_check_write+0x14/0x20 [ 2652.967681] ? _copy_from_user+0x99/0x110 [ 2652.971813] ? memdup_user+0x5e/0x90 [ 2652.975506] ? copy_mount_options+0x1f7/0x2e0 [ 2652.979992] SyS_mount+0xab/0x120 [ 2652.983429] ? copy_mnt_ns+0xb30/0xb30 [ 2652.987296] do_syscall_64+0x281/0x940 [ 2652.991161] ? vmalloc_sync_all+0x30/0x30 [ 2652.995287] ? _raw_spin_unlock_irq+0x27/0x70 [ 2652.999762] ? finish_task_switch+0x1c1/0x7e0 [ 2653.004237] ? syscall_return_slowpath+0x550/0x550 [ 2653.009144] ? syscall_return_slowpath+0x2ac/0x550 [ 2653.014052] ? prepare_exit_to_usermode+0x350/0x350 [ 2653.019051] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2653.024396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2653.029224] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2653.034390] RIP: 0033:0x454e79 [ 2653.037564] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2653.045426] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2653.052675] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2653.059922] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2653.067181] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2653.074428] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000047 2018/03/30 22:45:36 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x5, 0x800, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f00000001c0), &(0x7f0000000180), 0x14b0adb2e645d8a5}, 0x20) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) 2018/03/30 22:45:36 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163", 0x1b}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:36 executing program 1 (fault-call:19 fault-nth:72): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) [ 2653.083482] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 2653.268107] devpts: called with bogus options [ 2653.394710] devpts: called with bogus options [ 2653.409140] devpts: called with bogus options [ 2653.445285] FAULT_INJECTION: forcing a failure. [ 2653.445285] name failslab, interval 1, probability 0, space 0, times 0 [ 2653.456649] CPU: 1 PID: 5940 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2653.463830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2653.473176] Call Trace: [ 2653.475766] dump_stack+0x194/0x24d [ 2653.479402] ? arch_local_irq_restore+0x53/0x53 [ 2653.484089] should_fail+0x8c0/0xa40 [ 2653.487811] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 2653.492827] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2653.497925] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2653.503107] ? __lock_acquire+0x664/0x3e00 [ 2653.507332] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2653.512527] ? find_held_lock+0x35/0x1d0 [ 2653.516607] ? __lock_is_held+0xb6/0x140 [ 2653.520686] ? check_same_owner+0x320/0x320 [ 2653.525012] ? __d_lookup+0x4f4/0x830 [ 2653.528831] ? rcu_note_context_switch+0x710/0x710 [ 2653.533770] should_failslab+0xec/0x120 [ 2653.537746] kmem_cache_alloc+0x47/0x760 [ 2653.541815] __d_alloc+0xc1/0xbd0 [ 2653.545274] ? shrink_dcache_for_umount+0x290/0x290 [ 2653.550297] ? d_alloc_parallel+0x1b40/0x1b40 [ 2653.554805] ? lock_release+0xa40/0xa40 [ 2653.558791] ? mark_held_locks+0xaf/0x100 [ 2653.562934] ? d_lookup+0x133/0x2e0 [ 2653.566544] ? d_lookup+0x1d5/0x2e0 [ 2653.570152] d_alloc+0x8e/0x340 [ 2653.573412] ? __d_alloc+0xbd0/0xbd0 [ 2653.577101] ? full_name_hash+0x9b/0xe0 [ 2653.581060] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2653.586318] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2653.590540] rpc_populate.constprop.15+0xa3/0x340 [ 2653.595369] rpc_fill_super+0x379/0xae0 [ 2653.599324] ? cap_capable+0x1b5/0x230 [ 2653.603190] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2653.608367] ? security_capable+0x8e/0xc0 [ 2653.612502] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2653.617667] ? ns_capable_common+0xcf/0x160 [ 2653.621964] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2653.627128] mount_ns+0xc4/0x190 [ 2653.630471] rpc_mount+0x9e/0xd0 [ 2653.633815] mount_fs+0x66/0x2d0 [ 2653.637158] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2653.641712] ? may_umount+0xa0/0xa0 [ 2653.645327] ? _raw_read_unlock+0x22/0x30 [ 2653.649451] ? __get_fs_type+0x8a/0xc0 [ 2653.653320] do_mount+0xea4/0x2bb0 [ 2653.656835] ? __might_fault+0x110/0x1d0 [ 2653.660872] ? copy_mount_string+0x40/0x40 [ 2653.665080] ? check_same_owner+0x320/0x320 [ 2653.669377] ? __check_object_size+0x8b/0x530 [ 2653.673846] ? __might_sleep+0x95/0x190 [ 2653.677800] ? kasan_check_write+0x14/0x20 [ 2653.682024] ? _copy_from_user+0x99/0x110 [ 2653.686164] ? memdup_user+0x5e/0x90 [ 2653.689854] ? copy_mount_options+0x1f7/0x2e0 [ 2653.694327] SyS_mount+0xab/0x120 [ 2653.697753] ? copy_mnt_ns+0xb30/0xb30 [ 2653.701615] do_syscall_64+0x281/0x940 [ 2653.705476] ? vmalloc_sync_all+0x30/0x30 [ 2653.709599] ? _raw_spin_unlock_irq+0x27/0x70 [ 2653.714074] ? finish_task_switch+0x1c1/0x7e0 [ 2653.718544] ? syscall_return_slowpath+0x550/0x550 [ 2653.723451] ? syscall_return_slowpath+0x2ac/0x550 [ 2653.728373] ? prepare_exit_to_usermode+0x350/0x350 [ 2653.733385] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2653.738734] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2653.743563] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2653.748726] RIP: 0033:0x454e79 [ 2653.751888] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2653.759571] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2653.766819] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2653.774065] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2653.781310] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2653.788553] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000048 2018/03/30 22:45:36 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x7, 0x200, 0xb91, 0x0, 0x4, r0, 0x15}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xc, 0xffffffb5}, [], {0x95}}, &(0x7f0000000100)='GPL\x00', 0xa3d, 0x99, &(0x7f0000000000)=""/153}, 0x43) 2018/03/30 22:45:36 executing program 3: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd4, 0x10, r0}, 0x2c) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x83, &(0x7f0000000100)="714b80797dbc5ff1de3086de78ea", &(0x7f0000000200)=""/131}, 0x28) 2018/03/30 22:45:36 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x0, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:36 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x100000000, 0x9, 0x4, 0x3, 0x0, 0x2, 0x25821, 0x2, 0x9b1, 0x6, 0xfffffffffffffffa, 0x0, 0x101, 0x9, 0x119, 0x8000000, 0x661, 0x7fff, 0xfe, 0x0, 0x1, 0x0, 0x80000000, 0x101, 0xffe000000000000, 0x1, 0x3, 0x8000000000, 0x0, 0x8e, 0x11b5ed35, 0x0, 0x7ff, 0x1484, 0x1, 0x1, 0x0, 0x7b, 0x1, @perf_config_ext={0x40, 0x7fff}, 0x1, 0x5, 0x3, 0x2, 0x0, 0x1, 0x5}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x3) r1 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x8000, 0x7ff, 0x1, 0x5267, 0x0, 0x3, 0x443, 0x1, 0x0, 0x0, 0xe7f, 0x7, 0xfffffffffffffffb, 0x189, 0x5, 0x8001, 0x5, 0x3, 0x3, 0x6, 0x9, 0xd3, 0xffff, 0x8, 0xffff, 0x7ff, 0xae, 0x4a97, 0x1, 0xf4, 0x0, 0x7fff, 0x1, 0x3, 0x4, 0x7fffffff, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000080), 0x1}, 0x800, 0xffffffff, 0x3f, 0x5, 0x400000000000000, 0x4, 0x8}, 0xffffffffffffffff, 0xf, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) bpf$PROG_LOAD(0x5, &(0x7f000000bfb8)={0x400000000000001, 0x3, &(0x7f000000b000)=@framed={{0x18}, [@alu={0x5}], {0x95}}, &(0x7f0000003000)='GPL\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231}, 0x48) 2018/03/30 22:45:36 executing program 4: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000140)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) gettid() bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r1, &(0x7f0000000240), &(0x7f0000000280)=""/71}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x99, &(0x7f00000001c0)=""/153}, 0xffffffffffffff68) 2018/03/30 22:45:36 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e0063050641") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:36 executing program 1 (fault-call:19 fault-nth:73): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:36 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163", 0x1b}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2653.796930] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/03/30 22:45:36 executing program 0: socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x0, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r2, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00'}, 0xb) perf_event_open(&(0x7f0000001c80)={0x2, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r2, 0xf, r1, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r2, 0xd, r3, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x1000020, 0x0) mkdir(&(0x7f0000001fc0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000001d00)='./file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d5") socketpair$inet(0x2, 0x3, 0x5, &(0x7f0000000680)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) r5 = getpid() r6 = perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x5, 0x0, 0x40, 0x8e, 0x0, 0x101, 0x100, 0xe, 0xff, 0x2, 0x10001, 0x3cf, 0x7, 0x1, 0x6, 0x800, 0x0, 0xffb, 0x400000000000000, 0x7, 0x80000000, 0x20, 0x5, 0x97, 0x1, 0x8, 0x10000, 0x0, 0x8, 0x0, 0x9, 0x5, 0x6, 0x8, 0x100000001, 0x2, 0x0, 0x9, 0x7, @perf_config_ext={0x40, 0x3}, 0x30121, 0x5, 0x71, 0x3, 0x6, 0x8, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x8001, 0x3, 0xdf6f, 0x8, 0x0, 0x7f, 0xc8000, 0x1, 0x7b1866b0, 0x3, 0x4, 0x2, 0x0, 0x40, 0x10000, 0xfffffffffffffffd, 0xff, 0x41, 0x3, 0xed68, 0x8, 0x7, 0x3, 0x4, 0x4, 0x3ff, 0xfffffffffffffffa, 0xfcfd, 0x1, 0x7, 0x7f, 0x101, 0x3, 0x1, 0x400, 0x0, 0x0, 0x2, 0x6, @perf_bp={&(0x7f00000001c0), 0x5}, 0x189, 0x1000, 0x9, 0x2, 0x7, 0x3}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000001bf00000000000006000000c94e000018000000000000000021000018100000770be10b0712c9932b32a87ca98e6b6a4306738ae4d954cf4f2e0f1e75fe861e9f946ad17dd0957cb34f66"], &(0x7f0000000380)='syzkaller\x00', 0x2, 0x99, &(0x7f00000003c0)=""/153, 0x0, 0x1}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0xfffffc61) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x5, 0x0, 0xcc10, 0x4, 0xffffffffffffffff, 0x6}, 0x2c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) 2018/03/30 22:45:36 executing program 2: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x0, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x8, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r3) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb1104058d8843") close(r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r4, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x3fffffe}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000540)={r4}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r4}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) sendmsg(r7, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r7, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(r8, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) recvmsg(r7, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000500000000000000deffffff0000000000850020001bf2ff00dbf50e6200000004cc9500ddffffbf7e54000000000000000000000000000000"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x14, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000080000000000000000000000850000001b000000000000000000000085000000120000000000000000000000ff06ffff7c250000000000000000000018000000030000000000000000000000bf01feff080000000000000000000000d0f7fffffcffffff0000000000000000637f5e00ffffffff0000000000000000181a0000", @ANYRES32=r6, @ANYBLOB="00000000000000000400118f0dc3a464553e2e13c4fa11c9b10000eeff04ff"], &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r9}, 0x48) [ 2653.915701] devpts: called with bogus options [ 2653.932209] devpts: called with bogus options [ 2653.950561] devpts: called with bogus options 2018/03/30 22:45:36 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e0063050641") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:36 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x0, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x0, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x0, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x244, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r0, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) getpid() r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000002380)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000000000000000003d01f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r3) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000001a00)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001940)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1c127df7274c9ea1675e02fa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d90fcbb2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/30 22:45:36 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x0, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2654.021209] FAULT_INJECTION: forcing a failure. [ 2654.021209] name failslab, interval 1, probability 0, space 0, times 0 [ 2654.032523] CPU: 1 PID: 5976 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2654.039711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2654.049052] Call Trace: [ 2654.051632] dump_stack+0x194/0x24d [ 2654.055249] ? arch_local_irq_restore+0x53/0x53 [ 2654.059910] should_fail+0x8c0/0xa40 [ 2654.063605] ? perf_trace_lock_acquire+0xe3/0x980 [ 2654.068435] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2654.073529] ? trace_event_raw_event_lock+0x340/0x340 [ 2654.078702] ? perf_trace_lock+0x900/0x900 [ 2654.082923] ? mark_held_locks+0xaf/0x100 [ 2654.087054] ? __raw_spin_lock_init+0x1c/0x100 [ 2654.091642] ? find_held_lock+0x35/0x1d0 [ 2654.095690] ? __lock_is_held+0xb6/0x140 [ 2654.099742] ? check_same_owner+0x320/0x320 [ 2654.104046] ? d_alloc+0x269/0x340 [ 2654.107570] ? rcu_note_context_switch+0x710/0x710 [ 2654.112487] should_failslab+0xec/0x120 [ 2654.116446] kmem_cache_alloc+0x47/0x760 [ 2654.120492] ? d_drop+0x51/0x60 [ 2654.123752] ? rpc_i_callback+0x30/0x30 [ 2654.127708] rpc_alloc_inode+0x1a/0x20 [ 2654.131576] alloc_inode+0x65/0x180 [ 2654.135186] new_inode_pseudo+0x69/0x190 [ 2654.139228] ? prune_icache_sb+0x1a0/0x1a0 [ 2654.143444] ? do_raw_spin_trylock+0x190/0x190 [ 2654.148008] ? d_add+0xa70/0xa70 [ 2654.151365] new_inode+0x1c/0x40 [ 2654.154713] rpc_get_inode+0x20/0x1e0 [ 2654.158497] __rpc_create_common+0x5d/0x1d0 [ 2654.162806] rpc_populate.constprop.15+0x1ad/0x340 [ 2654.167726] rpc_fill_super+0x379/0xae0 [ 2654.171684] ? cap_capable+0x1b5/0x230 [ 2654.175554] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2654.180725] ? security_capable+0x8e/0xc0 [ 2654.184855] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2654.190033] ? ns_capable_common+0xcf/0x160 [ 2654.194341] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2654.199510] mount_ns+0xc4/0x190 [ 2654.202860] rpc_mount+0x9e/0xd0 [ 2654.206209] mount_fs+0x66/0x2d0 [ 2654.209561] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2654.214125] ? may_umount+0xa0/0xa0 [ 2654.217736] ? _raw_read_unlock+0x22/0x30 [ 2654.221865] ? __get_fs_type+0x8a/0xc0 [ 2654.225740] do_mount+0xea4/0x2bb0 [ 2654.229259] ? __might_fault+0x110/0x1d0 [ 2654.233310] ? copy_mount_string+0x40/0x40 [ 2654.237625] ? __check_object_size+0x8b/0x530 [ 2654.242106] ? __might_sleep+0x95/0x190 [ 2654.246072] ? kasan_check_write+0x14/0x20 [ 2654.250289] ? _copy_from_user+0x99/0x110 [ 2654.254425] ? memdup_user+0x5e/0x90 [ 2654.258118] ? copy_mount_options+0x1f7/0x2e0 [ 2654.262597] SyS_mount+0xab/0x120 [ 2654.266033] ? copy_mnt_ns+0xb30/0xb30 [ 2654.269905] do_syscall_64+0x281/0x940 [ 2654.273772] ? vmalloc_sync_all+0x30/0x30 [ 2654.277903] ? finish_task_switch+0x1c1/0x7e0 [ 2654.282381] ? syscall_return_slowpath+0x550/0x550 [ 2654.287293] ? syscall_return_slowpath+0x2ac/0x550 [ 2654.292205] ? prepare_exit_to_usermode+0x350/0x350 [ 2654.297201] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2654.302553] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2654.307380] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2654.312554] RIP: 0033:0x454e79 [ 2654.315722] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2654.323415] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2654.330668] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2654.337916] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2654.345165] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2654.352415] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000049 [ 2654.360792] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfsd 2018/03/30 22:45:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000002340)={&(0x7f0000002200)=@hci={0x0, 0x0}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000002280)=""/52, 0x34}], 0x1, &(0x7f0000002300)=""/16, 0x10, 0x76}, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000002380)={0xf, 0x4, &(0x7f0000000580)=@raw=[@alu={0x7, 0x80, 0xa, 0xb, 0x6, 0x50, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9fa3, 0x0, 0x0, 0x0, 0x9}], &(0x7f00000005c0)='syzkaller\x00', 0x5, 0xf3, &(0x7f0000000600)=""/243, 0x40f00, 0x1, [], r1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) recvmsg$kcm(r3, &(0x7f0000000b80)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000780)=""/108, 0x6c}, {&(0x7f0000000800)=""/9, 0x9}, {&(0x7f0000000840)=""/132, 0x84}, {&(0x7f0000000900)=""/251, 0xfb}, {&(0x7f0000000a00)=""/219, 0xdb}], 0x5, 0x0, 0x0, 0x6}, 0x2042) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000280)=r2, 0x4) sendmsg$kcm(r4, &(0x7f0000001f00)={&(0x7f0000000bc0)=@ax25={0x3, {"6d5e654e03f94c"}, 0x6}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c40)="ff7718b03572e9691fa286673c96d2d21d42c0eaf9c2b822157939243e8c5db195cc6e9354a637fe54bf8a768829f90a299924e4cb8eea01e3", 0x39}, {&(0x7f0000000c80)="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", 0xfc}], 0x2, &(0x7f0000000dc0)=[{0x40, 0x1bd, 0x1, "8a98b4ea5940f5605009eecb19ebb4aa826fecbd4bc12bb4df2e22e10fff1ab684ffe5d57c6981b13d0b"}, {0x40, 0x119, 0xdf9, "9a57b7cd7694e07b4eabaefaab9ffd88bad456c22b81e9734739c6844e789d451f5caeb24a0e37e46a1fd626d695"}, {0x60, 0x86, 0x9d, "b20543efc77b89895fb286dfb088541f2fa4b9e54c2ddcb5f3bf01fd4a4c00f9143654e1ec1f9cb31c3e21b0874401fee10f079469b50eb0714af3695ae7621395ec3eadb4d1120da506aa"}, {0x1010, 0x1, 0x5, "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"}, {0x20, 0x88, 0x5, "fc54bfde240b3b1134"}], 0x1110, 0x41}, 0x0) recvmsg$kcm(r3, &(0x7f00000021c0)={&(0x7f0000001f40)=@l2, 0x80, &(0x7f0000002140)=[{&(0x7f0000001fc0)=""/118, 0x76}, {&(0x7f0000002040)=""/236, 0xec}, {&(0x7f0000002400)=""/221, 0xdd}, {&(0x7f0000002500)=""/196, 0xc4}, {&(0x7f0000002600)=""/4096, 0x1000}], 0x5, &(0x7f0000003600)=""/106, 0x6a, 0x5}, 0x10102) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/30 22:45:37 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163", 0x1b}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:37 executing program 1 (fault-call:19 fault-nth:74): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) [ 2654.380450] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 2654.583330] xprt_adjust_timeout: rq_timeout = 0! [ 2654.654791] devpts: called with bogus options [ 2654.686435] hugetlbfs: Bad mount option: "" [ 2654.702453] devpts: called with bogus options [ 2654.713685] devpts: called with bogus options [ 2654.738247] devpts: called with bogus options [ 2654.745090] FAULT_INJECTION: forcing a failure. [ 2654.745090] name failslab, interval 1, probability 0, space 0, times 0 [ 2654.756425] CPU: 1 PID: 6009 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2654.763621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2654.772983] Call Trace: [ 2654.775578] dump_stack+0x194/0x24d [ 2654.779208] ? arch_local_irq_restore+0x53/0x53 [ 2654.783891] should_fail+0x8c0/0xa40 [ 2654.787618] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2654.792738] ? perf_trace_lock+0x900/0x900 [ 2654.796995] ? __lock_acquire+0x664/0x3e00 [ 2654.801257] ? find_held_lock+0x35/0x1d0 [ 2654.805340] ? __lock_is_held+0xb6/0x140 [ 2654.809429] ? check_same_owner+0x320/0x320 [ 2654.813763] ? __d_lookup+0x4f4/0x830 [ 2654.817584] ? rcu_note_context_switch+0x710/0x710 [ 2654.822539] should_failslab+0xec/0x120 [ 2654.826520] kmem_cache_alloc+0x47/0x760 [ 2654.830594] __d_alloc+0xc1/0xbd0 [ 2654.834055] ? shrink_dcache_for_umount+0x290/0x290 [ 2654.839077] ? d_alloc_parallel+0x1b40/0x1b40 [ 2654.843610] ? lock_release+0xa40/0xa40 [ 2654.847341] devpts: called with bogus options [ 2654.847592] ? mark_held_locks+0xaf/0x100 [ 2654.847607] ? d_lookup+0x133/0x2e0 [ 2654.859851] ? d_lookup+0x1d5/0x2e0 [ 2654.863493] d_alloc+0x8e/0x340 [ 2654.866784] ? __d_alloc+0xbd0/0xbd0 [ 2654.870516] ? full_name_hash+0x9b/0xe0 [ 2654.874514] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2654.879806] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2654.880929] hugetlbfs: Bad mount option: "" [ 2654.884054] rpc_populate.constprop.15+0xa3/0x340 [ 2654.884074] rpc_fill_super+0x379/0xae0 [ 2654.884090] ? cap_capable+0x1b5/0x230 [ 2654.884101] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2654.884115] ? security_capable+0x8e/0xc0 [ 2654.884128] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2654.884140] ? ns_capable_common+0xcf/0x160 [ 2654.884154] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2654.884164] mount_ns+0xc4/0x190 [ 2654.884176] rpc_mount+0x9e/0xd0 [ 2654.884188] mount_fs+0x66/0x2d0 [ 2654.884202] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2654.884214] ? may_umount+0xa0/0xa0 [ 2654.943502] ? _raw_read_unlock+0x22/0x30 [ 2654.947633] ? __get_fs_type+0x8a/0xc0 [ 2654.951508] do_mount+0xea4/0x2bb0 [ 2654.955032] ? __might_fault+0x110/0x1d0 [ 2654.959080] ? copy_mount_string+0x40/0x40 [ 2654.963299] ? __check_object_size+0x8b/0x530 [ 2654.967783] ? __might_sleep+0x95/0x190 [ 2654.971743] ? kasan_check_write+0x14/0x20 [ 2654.975961] ? _copy_from_user+0x99/0x110 [ 2654.980095] ? memdup_user+0x5e/0x90 [ 2654.983790] ? copy_mount_options+0x1f7/0x2e0 [ 2654.988267] SyS_mount+0xab/0x120 [ 2654.991700] ? copy_mnt_ns+0xb30/0xb30 [ 2654.995571] do_syscall_64+0x281/0x940 [ 2654.999440] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 2655.004958] ? syscall_return_slowpath+0x550/0x550 [ 2655.009878] ? syscall_return_slowpath+0x2ac/0x550 [ 2655.014793] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2655.020139] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2655.024968] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2655.030136] RIP: 0033:0x454e79 [ 2655.033305] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2655.040993] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2655.048246] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2655.055496] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2655.062747] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2655.069994] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000004a [ 2655.078750] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 2655.357232] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:45:38 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xd68, 0x1, 0x0, 0x2a31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='rootfs\x00', 0x1000, &(0x7f00000002c0)) mkdir(&(0x7f00000002c0)='./file1/file0\x00', 0x80) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000500)='nsfs\x00', 0x20, &(0x7f00000004c0)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000100)='./file1\x00'}, 0x10) mount(&(0x7f0000000800)='./file1\x00', &(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='overlay\x00', 0x10000, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x141) mount(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='xfs\x00', 0x0, &(0x7f00000002c0)) 2018/03/30 22:45:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r1 = getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x4, 0xa2f5, 0x4, 0x7, 0x0, 0xaee, 0x840, 0x9, 0x1, 0x6df4722d, 0xfff, 0xfffffffffffffff7, 0x4, 0x8, 0x6, 0xfffffffffffffffb, 0x8, 0x800, 0xd06, 0x54a, 0x6, 0x2, 0x2, 0x7, 0x1, 0x3, 0xcf, 0x29f, 0x7, 0xffffffff, 0x1000, 0x9, 0x2, 0x5, 0x2c3a, 0x2, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f0000000100), 0xa}, 0x2, 0x5, 0x0, 0x6, 0x6, 0x3, 0x5}, r1, 0xf, r0, 0x3) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000003c0), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4}, 0x3d1) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='devtmpfs\x00', 0x0, &(0x7f0000000380)) 2018/03/30 22:45:38 executing program 4: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001880)={&(0x7f0000000500), 0x80, &(0x7f0000000840)=[{&(0x7f0000000580)=""/240, 0xf0}, {&(0x7f0000000680)=""/39, 0x27}, {&(0x7f00000006c0)=""/97, 0x61}, {&(0x7f0000000740)=""/195, 0xc3}], 0x4, &(0x7f0000000880)=""/4096, 0x1000, 0x80}, 0x40000161) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1b5}, 0x2c) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000280)={&(0x7f0000000200)=@generic, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x49}, 0x100) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000c00720ac0ff0000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x6, 0x2ed, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r4, 0x0, 0xe, 0xb6, &(0x7f0000000040)="03e43ae3e0e0e4a1b4d6dcfbf56a", &(0x7f0000000100)=""/182}, 0x28) recvmsg(r1, &(0x7f000000dc80)={&(0x7f000000ca40)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f000000cc40)=[{&(0x7f000000cac0)=""/54, 0x36}, {&(0x7f000000cb00)=""/46, 0x2e}, {&(0x7f000000cb40)=""/243, 0xf3}], 0x3, &(0x7f000000cc80)=""/4096, 0x1000, 0x100}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000dcc0)={0xd, 0xa, &(0x7f00000019c0)=@raw=[@exit={0x95}, @generic={0x2, 0x9, 0x7ff, 0x1}, @exit={0x95}, @ldst={0x2, 0x3, 0x6, 0x7, 0x5, 0xfffffffe, 0xfffffffffffffff9}, @ldst={0x1, 0x3, 0x6, 0x0, 0x9, 0xffffffff}], &(0x7f0000001a40)='syzkaller\x00', 0x81, 0x97, &(0x7f0000001a80)=""/151, 0x40f00, 0x1, [], r5}, 0x48) recvmsg(r2, &(0x7f0000000480)={&(0x7f00000002c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000340)=""/116, 0x74}], 0x1, &(0x7f00000003c0)=""/184, 0xb8, 0x5}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001940)={r4, 0x50, &(0x7f00000018c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001980)=r6, 0x4) 2018/03/30 22:45:38 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:38 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff", 0x28}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:38 executing program 3: mkdir(&(0x7f0000000f80)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000dc0)={&(0x7f0000000d80)='./file0/bus\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000f00)='sysfs\x00') socketpair$ax25(0x3, 0x5, 0xff, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x8, 0x0, 0xa4, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000004c0)={&(0x7f00000002c0)=@ipx, 0x80, &(0x7f0000000480)=[{&(0x7f0000000340)=""/202, 0xca}, {&(0x7f0000000440)=""/30, 0x1e}], 0x2, 0x0, 0x0, 0x8}, 0x2) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000980)="ff15f96673debf110c933a8338f639c7e76d69e432264fab7bbb821823bd5304dad968e01afb639b3a09810d6676c402924c10f9c2f1c5c40fba438f00f50b2e6aaaed923f1fed2c1befca81b0b320d4b1ebb0973f9b794fb359dc68ac9d340af789a66ae51117e7335b55d26530c51cd78dbeabe42b", 0x61, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000cc0)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) socketpair$ax25(0x3, 0x7, 0x6, &(0x7f0000000a00)) mkdir(&(0x7f0000000e00)='./file0\x00', 0x10) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0\x00', &(0x7f0000000a80)='sockfs\x00', 0x22, &(0x7f0000000dc0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001180)={r1, 0x28, &(0x7f0000001100)}, 0xffffffffffffff14) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000001200)={0x800040010, 0x2002000004, 0x4, 0x4, 0x14, r2, 0x3, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) socketpair(0x5, 0x0, 0x1, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r4, &(0x7f0000000940)={&(0x7f0000000540)=@un=@abs, 0x80, &(0x7f0000000840)=[{&(0x7f00000005c0)=""/32, 0x20}, {&(0x7f0000000600)=""/45, 0x2d}, {&(0x7f0000000640)=""/159, 0x9f}, {&(0x7f0000000700)=""/135, 0x87}, {&(0x7f00000007c0)=""/121, 0x79}], 0x5, &(0x7f00000008c0)=""/99, 0x63, 0x4}, 0x20) sendmsg$kcm(r5, &(0x7f00000011c0)={&(0x7f0000000e80)=@nfc_llcp={0x27, 0x1, 0x2, 0x6, 0xec1, 0x6, "c562f74b0196f7bbfc66a7da6e2e92461ce1bc58754bfd8e008fc54818a874b3385fc782ce04d8a2958a59353c8303053dc7744ac3adab6814a27b1735c77a", 0x32}, 0x80, &(0x7f0000001140), 0x0, &(0x7f00000047c0)=ANY=[], 0x0, 0x40000}, 0x40004) recvmsg$kcm(r5, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000ac0)=""/126, 0x7e}, {&(0x7f0000000b40)=""/209, 0xd1}, {&(0x7f0000001240)=""/228, 0xe4}], 0x3, &(0x7f0000000c40)=""/60, 0x3c, 0x9}, 0x10100) 2018/03/30 22:45:38 executing program 1 (fault-call:19 fault-nth:75): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:38 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x0, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2655.451403] EXT4-fs (sda1): re-mounted. Opts: [ 2655.457567] overlayfs: missing 'lowerdir' [ 2655.482308] FAULT_INJECTION: forcing a failure. [ 2655.482308] name failslab, interval 1, probability 0, space 0, times 0 [ 2655.490802] devpts: called with bogus options [ 2655.493659] CPU: 0 PID: 6038 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2655.505221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2655.514379] overlayfs: missing 'lowerdir' [ 2655.514573] Call Trace: [ 2655.521297] dump_stack+0x194/0x24d [ 2655.525762] ? arch_local_irq_restore+0x53/0x53 [ 2655.530452] should_fail+0x8c0/0xa40 [ 2655.534176] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2655.539293] ? __lock_is_held+0xb6/0x140 [ 2655.543371] ? mark_held_locks+0xaf/0x100 [ 2655.547536] ? __raw_spin_lock_init+0x1c/0x100 [ 2655.552140] ? find_held_lock+0x35/0x1d0 [ 2655.556220] ? __lock_is_held+0xb6/0x140 [ 2655.560289] ? check_same_owner+0x320/0x320 [ 2655.564606] ? d_alloc+0x269/0x340 [ 2655.568146] ? rcu_note_context_switch+0x710/0x710 [ 2655.573076] ? lock_release+0xa40/0xa40 [ 2655.577074] should_failslab+0xec/0x120 [ 2655.581045] kmem_cache_alloc+0x47/0x760 [ 2655.585096] ? d_drop+0x51/0x60 [ 2655.588369] ? rpc_i_callback+0x30/0x30 [ 2655.592331] rpc_alloc_inode+0x1a/0x20 [ 2655.596203] alloc_inode+0x65/0x180 [ 2655.599813] new_inode_pseudo+0x69/0x190 [ 2655.603855] ? prune_icache_sb+0x1a0/0x1a0 [ 2655.608068] ? do_raw_spin_trylock+0x190/0x190 [ 2655.612628] ? d_add+0xa70/0xa70 [ 2655.615980] new_inode+0x1c/0x40 [ 2655.619328] rpc_get_inode+0x20/0x1e0 [ 2655.623107] __rpc_create_common+0x5d/0x1d0 [ 2655.627413] rpc_populate.constprop.15+0x1ad/0x340 [ 2655.632330] rpc_fill_super+0x379/0xae0 [ 2655.636288] ? cap_capable+0x1b5/0x230 [ 2655.640153] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2655.645323] ? security_capable+0x8e/0xc0 [ 2655.649454] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2655.654620] ? ns_capable_common+0xcf/0x160 [ 2655.658924] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2655.664092] mount_ns+0xc4/0x190 [ 2655.667438] rpc_mount+0x9e/0xd0 [ 2655.670788] mount_fs+0x66/0x2d0 [ 2655.674136] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2655.678700] ? may_umount+0xa0/0xa0 [ 2655.682306] ? _raw_read_unlock+0x22/0x30 [ 2655.686435] ? __get_fs_type+0x8a/0xc0 [ 2655.690305] do_mount+0xea4/0x2bb0 [ 2655.693825] ? __might_fault+0x110/0x1d0 [ 2655.697870] ? copy_mount_string+0x40/0x40 [ 2655.702083] ? check_same_owner+0x320/0x320 [ 2655.706406] ? __check_object_size+0x8b/0x530 [ 2655.710887] ? __might_sleep+0x95/0x190 [ 2655.714848] ? kasan_check_write+0x14/0x20 [ 2655.719062] ? _copy_from_user+0x99/0x110 [ 2655.723195] ? memdup_user+0x5e/0x90 [ 2655.726887] ? copy_mount_options+0x1f7/0x2e0 [ 2655.731363] SyS_mount+0xab/0x120 [ 2655.734795] ? copy_mnt_ns+0xb30/0xb30 [ 2655.738663] do_syscall_64+0x281/0x940 [ 2655.742532] ? vmalloc_sync_all+0x30/0x30 [ 2655.746658] ? _raw_spin_unlock_irq+0x27/0x70 [ 2655.751134] ? finish_task_switch+0x1c1/0x7e0 [ 2655.755607] ? syscall_return_slowpath+0x550/0x550 [ 2655.760516] ? syscall_return_slowpath+0x2ac/0x550 [ 2655.765427] ? prepare_exit_to_usermode+0x350/0x350 [ 2655.770425] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2655.775769] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2655.780597] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2655.785786] RIP: 0033:0x454e79 [ 2655.788954] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 22:45:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xfffffc61) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000040), &(0x7f0000000100)}, 0x20) r3 = getpid() perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x98c, 0x800, 0x3, 0x0, 0x6, 0xc80, 0x0, 0xfffffffffffffff8, 0x16, 0x9, 0xfdae, 0x5, 0x0, 0x8, 0xc77, 0x2, 0x8, 0x2, 0x8, 0xfffffffffffffc00, 0x100000001, 0x5, 0x0, 0x8, 0x3, 0x3, 0x2, 0x80, 0x8, 0x0, 0x0, 0x3, 0x8000, 0x6, 0x9, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000080), 0xa}, 0x3004, 0x7fffffff, 0x1, 0x2, 0xf70000000, 0x7, 0x5}, r3, 0xb, r1, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000280)=""/71}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f00000001c0)=""/153}, 0x48) 2018/03/30 22:45:38 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x0, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2655.796643] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2655.803912] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2655.811176] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2655.818424] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2655.825675] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000004b [ 2655.833208] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry gssd [ 2655.847671] devpts: called with bogus options 2018/03/30 22:45:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1e, 0x1, 0x3, 0x6, 0x3, r0, 0x6773}, 0x2c) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x2, 0x7, 0x8001, 0x10, 0xffffffffffffffff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={r0, &(0x7f0000000ac0)="a3261c53181af65214ad5ecb58589d0924544be09291cc13f5f9f83a9b35226ab5a55fa1b72f362063cfd9f403907e99fa63990df2c2a89c635a3bbc9410b1503f3e4a093a2411a2616f8ab9a79a75", &(0x7f0000000b40)="cd8249bf39d6176ef7346799ac199e6cf9e7fe02418812a394d9c874384d4ba7bd9d3b261f1a018dc32091fc8a5dc8a29b11c41d618eab351795754d5fa3ad297aec7e01f2990b", 0x2}, 0xfffffffffffffdf3) sendmsg(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)="654e8525c3d8a3a269fffab981c018ecd1ed1d41250e8cefbd5ee4bae370ceb76f18994299803c8f3c007db0b506d27a8d38bfd14b9dbdb9ab629de7de0672b365dce9cc2ecdff6971cd9b53ca275ecf9b426cade30df9ed069f246ad81f0fb4cef7a4d8504b908dddbad5235664fb43456c105d465f9e08de48116686d69255a3fb4d9f00907b0d2bb8743018c8568cdd1a098362e9db2beb107321a56d3b31b84590e0ea80d526985b20473a7c", 0xae}], 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000983b00950600000000000000fb99481ae4a53d011e47cf98d97a81a8c8b0c8"], &(0x7f0000008000)='syzkaller\x00', 0x24, 0x7f, &(0x7f0000008000)=""/127}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x7, 0x0, 0xffffff83}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f000000df19)=""/231}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={r0, &(0x7f0000000680), &(0x7f00000006c0)=""/166}, 0x18) mount(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='pstore\x00', 0x4, &(0x7f0000000640)="afb63e3ff55419f9e9572aabeb90d8184a20d3c850fa576f0f0d376978dcd77395a8eb26002ef5146d") r4 = perf_event_open(&(0x7f00000008c0)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x60) r5 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r4) r6 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000100)={r1, r3}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000980)={&(0x7f0000000940)='./file0\x00'}, 0x10) mkdir(&(0x7f00000009c0)='./file0\x00', 0x80) close(r5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xfb2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003700)={&(0x7f0000000280)=@pppoe={0x0, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003400)=""/251, 0xfb}, {&(0x7f0000003500)=""/14, 0xe}, {&(0x7f0000003540)=""/107, 0x6b}, {&(0x7f00000035c0)=""/211, 0xd3}], 0x4, 0x0, 0x0, 0x3ff}, 0x1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7}, 0x2c) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xf, 0x100000001, 0x3, 0x5, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r8, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) socketpair(0x6, 0x5, 0x3f, &(0x7f0000000840)={0xffffffffffffffff}) socketpair$inet(0x2, 0x800, 0x3b9b, &(0x7f0000000a00)) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f0000000880)={r7}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000800)) 2018/03/30 22:45:38 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0/file1\x00', 0x0, 0x18}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r0, 0x28, &(0x7f0000000600)={0x0, 0x0}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file0/file1/file0\x00', 0x0, 0x18}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000880)={0xffffffffffffff9c}) sendmsg$kcm(r2, &(0x7f0000001ec0)={&(0x7f00000008c0)=@rc={0x1f, {0xbb1, 0x5, 0x7, 0xe8b, 0xf636b1c, 0x404}, 0x2}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000940)="ffd235f365b96e16e52d538e484af8c9d9af5d1c16a441135a4329a09adfa17f0f207c3a375a132cb95872b64bd9016628627b636a7f1dc5ad16e57338fe65f0e038c7b9d32520bc86dd56803fc2208835eaa7ac1371bafa6fdce2db464914da409f63e0d7b857911b80b8ef77777f1e4bd90b87acefda6965", 0x79}], 0x1, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], 0x1b8, 0xc040}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff}) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000010}, 0x10) mount(&(0x7f0000000480)='./file0/file1\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='rootfs\x00', 0x20, &(0x7f0000000540)="7e7c40493568ac479c3fa9c7141ba81ea72fdf057ce1fd8f9a700ed0f7a2a9c31b84a81b2ac98f43eecbf9d1267b9b29e7e5064800c183764d6a280d6417b5ea361b3ca6c02500f8acb78a6b2433b7f98ff63c25a4badcf8f19646682c5484b44e495cf2f2e861797fa64ccbb9f5be4724bba6c765c07f0048f2c7fa41a8a88d8d32821d32f9f1d06be3981c5c12946509f77c2cd4b84475bc6c1458a9ed74e961beb4a19387d645") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a40)={r1, 0xffffffffffff61bb, 0x18}, 0xc) sendmsg$kcm(r2, &(0x7f0000001480)={&(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x3, 0x1, 0x2, 0x3, {0xa, 0x4e22, 0x2aa, @local={0xfe, 0x80, [], 0xaa}, 0x8ae}}}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000a40)}, {&(0x7f0000000ac0)="b5b7cf4662ed9995596fcb15d8f3ef37d953d2abe4f2dc04eb22a5b4ca0a79e72e43", 0x22}, {&(0x7f0000000e80)="83dd54c6843e8d1c7b1954be01f6bccbabcf97944b1988f7cf422faeb9270e1d925f4db19193bd3c7de6c218e449bfa34220c020f6e29d888446bc41cb50de1388adcf4c818ea9a869ec65858a3c4280dd5081a452612d8904708ad7b6c275be7594be6c8dbe59d4563968143ab068e8dd1f47164fe460553c6e4f4d4bbf419e7cc39ef38f643f5b7e407784c9cd7c7afebec9f3f39ff381edd285aac59845fe6ed7dddd17c1567ef9f270f047be7ffb036a9f25d38a6a5551938820e5f24cce90445b4e", 0xc4}, {&(0x7f0000001080)="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", 0xfd}], 0x4, &(0x7f0000001200)=[{0xa0, 0x117, 0x4, "f547cb923ff1a603a8008b5f610d71067aca48af9629650fe9f7a9b7e18364da0d359a49bd6485062b5f8561c07f53294aeba5c0f61cc2c337e21913ff7088caa1eaf10f8fb1c693fa659442fa9de79b5fdfa883de16f3f8badd18ea99057691146d3a409fc860991c197bbd615a5bf4e4b209bbafc90158ceaa7bb1133c8486379562b57125ec7e7b33"}], 0xa0, 0x8050}, 0x10) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000500)) [ 2655.857550] devpts: called with bogus options 2018/03/30 22:45:38 executing program 2: mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x100000, &(0x7f0000000280)="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") perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000028000)={r0, &(0x7f0000000200), &(0x7f0000000240)="13"}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1}, 0xc) close(r2) [ 2655.935871] devpts: called with bogus options 2018/03/30 22:45:38 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2655.994544] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 2656.087615] devpts: called with bogus options 2018/03/30 22:45:39 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x5, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xfa}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x38e, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = getpid() perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x9e, 0x5, 0x748, 0xfffffffffffffff7, 0x0, 0x7, 0x1, 0x1, 0x4, 0x100000001, 0x3, 0x3ff, 0x2a6, 0x1ff, 0x1, 0x801ff, 0x81, 0x4465, 0x3, 0x2, 0xffff, 0x5062, 0x31, 0x7fffffff, 0xfffffffffffffc01, 0x0, 0x4, 0xfffffffffffffff9, 0x3, 0x0, 0x5, 0x400, 0xb9, 0x100000000, 0x7ff, 0x5, 0x0, 0x3, 0x0, @perf_config_ext={0x315, 0x3}, 0x0, 0xfffffffffffffffd, 0x7f, 0x6, 0x7, 0x4, 0x5}, r2, 0xc, r0, 0x0) 2018/03/30 22:45:39 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:39 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff", 0x28}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:39 executing program 1 (fault-call:19 fault-nth:76): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:39 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x0, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:39 executing program 0: socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) socketpair(0x4, 0xa, 0x3f, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000080), &(0x7f00000000c0)="9324dd2dd2b255e23f1c701c5f56f0a7df389b5ba0c99efc67611e94c8d96965baa2466669b2d1b2c1fef09377ce2df73b338c3fd3bb38adbe3ed9b81898ea56441cb961d01c5f32b123843baf43560e0b117994bcaa5cbdd552b8139bcebbd485f6b6b1e271543058544876bf12b0311d42851d7075fcb0402371c2ed1f13086dd8d286e4668e51161bfe55066396f8665c38e7", 0x2}, 0x20) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) socketpair(0xa, 0x80000, 0x7, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)="9f002fd7e67bffcbe4311d781a80858882a5e8e8e0fc89d7d1bfe8a5eda653137bfa0d4228261c2383eee021ea660ef7d6a7e239e4e861b6657dafd1cd41ad5f68186349e73be13b4ef898c45bb5d62d9bdebe64440d72ade2adbaa4df879bac2516adae87dbcdf87f7b01ffe655698556ed81", 0x73}], 0x1, &(0x7f0000000300)=[{0x100, 0x0, 0xffffffffffffffe1, "6e1c41ad110f00fcdec9c77ac50fe49af574fa0a7f1e75d724296510d6d0c0f94ef7a0e709d5ee52c78e1ad8b9b4feb70a6d23a5d14d6503184335f7341560598bd103ff4070d55aa395ea9f24cb6596674d1eb5db878989ad2c29f4e44392aed86fb315cadbc3a352bf3ab450c3eeac6fdb259a667a6c4b5303e3add0799939c243a2c01d0b1c0d77c97d72a965ebbca3ddf787eb2757a5b2c626f6987f2bd4c94bb5057a6c30b4a9b80d6d11437e6a9ef3026cec3c939d37f12a4e849c3aee6be13f26c15399908e1a05163cbdc12bb03e79f139607b51d408b99ef6a798b48d6a7d498990dd5b8c"}, {0xc8, 0x29, 0xfffffffffffffffc, "4e87a1fb7b722c2f6f675d22612461198ebb5a76381788ec8769c9f3a5367202249d314228f67fd495591f39365245f1315a7bbf48173a5b3bfccffefea42882c3f8fa9af8cf61249bb988fe8d6fbbcb93796c9e8cd427ad4840f80d302c80bb52cfec699d6f2aa6456c2b84cbe576602d03407a9cd1b8dbdedd3baf6aabccc54db91d2ae0347bda1f0526d1887edf3a64cfd886441d1c3640178f1348986aa017b1f25aef32cee20495900ad9a43c8c5687c0d62f"}], 0x1c8, 0x4}, 0xc090) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000680)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000a40)) r5 = gettid() r6 = perf_event_open(&(0x7f0000000740)={0x0, 0x70, 0x2, 0x359, 0x6, 0xff, 0x0, 0x800, 0x0, 0x6, 0x5, 0x1, 0xe6, 0x4, 0x80, 0x9, 0x7, 0x9, 0x87, 0x1, 0x7fffffff, 0x0, 0x100, 0x7, 0x1f, 0x7, 0x5, 0x8, 0x646, 0x1, 0x1, 0x100000000, 0xfffffffffffffff8, 0x9, 0x80000000, 0x3, 0x313b6f7f, 0x8, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000700), 0x4}, 0x20, 0x7ff, 0x2, 0x7, 0x0, 0x8, 0xffff}, r5, 0x6, r3, 0x1) socketpair(0x1, 0x6, 0x4, &(0x7f00000007c0)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000900)={r0, &(0x7f0000000800)="81dfdca7e6902c8701707c849661ee7cbfe928c619d9ffc93a2e7e6897502968e8c43a8613be8776922e6ee5f4e7f1089ccfe2a09f1d3500b97781fa7d9eaf1fcb070f077e26ba68c9b65643833e59ed3179793fad7535c9361eb377d3da65a9e26cd13cf51429d35b1aa285b2d63a42fb2d7fb62f10a1f3a30bab4fb32e5ffa77c1571a97a0d8014301bd6e7cb21a849ed32ef6d0de484c1919ddb66a5ba8c39f5b1fd981", &(0x7f00000008c0)=""/48}, 0x18) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000940)={0xffffffffffffffff}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000980)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000009c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)={0xe, 0x0, 0x100, 0xfffffffffffffff8, 0x12, r1, 0xfffffffffffff1d2}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000500)=ANY=[@ANYBLOB="0100000000000000000000003c2657657b4b98fe67ccc729327da4218e41409af7326b49b60de57a19bf1c4531e8ad89500e94e89b0653304377eabbb76f8807dd25b7129c4158949f7973680cae7f75f6de814d8de59ea3cda8b6c9d92c17b3f30b837e20864ff1b47f11dd5c9bf7094dd1eed5a58557c4956bc86a8bb979518a30b670f452ca44cfb4bc0d3af24cbf2941be982a82e9fd316453f436a3da10dfa50a6c7b73246eb395cb71b814"]) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000bc0)={r3, &(0x7f0000000a80)="03900bc25e8bd5eea5a333c25da27e0823f9c41cd1441715b915ef3778a06f19d95a95fbde955a440822a524a7b029bef46d76540d27787fdaabfbbf8c432acb8eaab391ec4388a7ba46ab1bba4d3db14c3e63b52abc8c843e532ba08982e720945c685add626e24e7fde4afac33bc235dac12be0cc119f13a0dc3b461edb68b231e3c041fab2220d1819904fdf2b70ff1e8ee1d5b196ca0648f68386f3e2a986e3273ef321ed498e809", &(0x7f0000000b40)=""/103}, 0x18) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r1) socketpair(0x1f, 0x0, 0xff, &(0x7f0000000c00)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000c40)) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x0) perf_event_open(&(0x7f0000000cc0)={0x0, 0x70, 0x1000, 0x3faf, 0x542, 0x9, 0x0, 0x0, 0x4041, 0x0, 0x58f, 0x4, 0x6, 0xf7b, 0x7fffffff, 0x5, 0x4, 0xfffffffffffffff7, 0x8001, 0x80000000, 0x4df6b6d9, 0x18, 0x5, 0x5, 0x2, 0x4, 0x7fff, 0xff, 0x3, 0x5, 0x5, 0x9, 0x2, 0x47b, 0x8, 0x5, 0x5, 0xfff, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000c80), 0x3}, 0x2000, 0x7, 0x6, 0x6, 0x9, 0x10001, 0x10001}, r5, 0xc, r6, 0x2) mount(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)='./file0\x00', &(0x7f0000000080)='reiserfs\x00', 0x0, &(0x7f0000000e00)="1d0d17ccd03d6b6a4e363f1dbc593b07cc2de02888bf72160321fa9a2cc22b169a6a20099ad75fa2ded028658dc0f9d932b6d40096e1dc954530c691360d221301e5ad3408064187f3e33d53d997e49bee910d2b4c34df107c71b185ec87b66a17673a48c616f906512f049c203f4450131e509fd45441e61ef70c2dba8b62446a7da914fd7e5c9a0f31a2f6be4153ec6320c479c2ad1eca33d3ef81f8e7ca4b44") ioctl$PERF_EVENT_IOC_REFRESH(r9, 0x2402, 0x4) perf_event_open(&(0x7f0000000ec0)={0x5, 0x70, 0x3, 0x5, 0x8, 0x7, 0x0, 0x8, 0x60, 0x1, 0x9, 0xffffffffffffffff, 0x960b, 0x200, 0x1, 0xfffffffffffffffb, 0x7, 0x604e5fd3, 0x9, 0x8000, 0x8, 0x101, 0xe68, 0x5, 0x6, 0xffffffff, 0x100000000, 0x2, 0x7, 0x90, 0x9, 0x1, 0x5, 0x2, 0x0, 0xa6de, 0x2, 0x1, 0x0, 0x1800000000, 0x7, @perf_config_ext={0x3ff, 0xffffffff}, 0x4, 0x1, 0x401, 0x2, 0x200, 0x24a4, 0x100000000}, r5, 0x1, r8, 0xa) close(r4) 2018/03/30 22:45:39 executing program 2: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x800000000000, 0x0, 0xd5, 0x3}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x83, &(0x7f0000000100)="714b80797dbc5ff1de3086de78ea", &(0x7f0000000200)=""/131}, 0x28) 2018/03/30 22:45:39 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff8001, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) close(r0) close(r0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b00)) r1 = getpid() perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x80, 0x1d, 0x8001, 0x8000, 0x0, 0x10001, 0x100, 0x1, 0x3, 0x8, 0x4, 0x9, 0x0, 0x7f, 0x0, 0x3, 0x80, 0x9, 0x8a, 0x7, 0xffffffffffffff80, 0x4, 0x1, 0x1000, 0x8, 0xfff, 0x5, 0x8, 0xfeaf, 0xffffffffffffffff, 0x80, 0x8, 0x8, 0x2, 0x35d, 0x15e9, 0x0, 0x4, 0x1, @perf_config_ext={0x100000001, 0x9}, 0x40, 0x1, 0x9, 0x7, 0xb9, 0x8, 0x3}, r1, 0xb, r0, 0x2) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000040)='./file0\x00', 0xfffffffffffffffc) mount(&(0x7f0000000240)='./file1\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000300)="af8718302322870f94cac6a7d7e975b303abc7c32a4f087f63c658f9625c10") sendmsg(r2, &(0x7f0000002dc0)={&(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, 0x1, 0x1}}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000680)="4489a71c5986f6c7b90bccda1ed5a090c24c4f4a00e9a47dbf27dc9d7989581b2d30721cda5e9ebf766b872b3962ca7c4f92eca5effcb42562608578cacba42710cb3f2125bcd8d845e389357bf22d02c104d53743f6b71120882cc77ec6df4df8fd020c7f6180d83902e8e72e77bbe0604b117907d2d988099115465bdee5f6d13962e77de07dc957b57b42207fb322ddd8c8c3f204e268658a44603da57ab3e80a668f74f3d56e81736ff6ec81421a8e96bdaf909ed54c3d9be728f36f4cc338a40ddac490a33cc5b471cb4e9a51c021c6a6213936c872abd1519ab6a46985b0cec95de575c31f4e95b792663b10fb23bc4250cf5be397", 0xf8}], 0x1, &(0x7f0000005540)=ANY=[], 0x0, 0x80}, 0x20000000) recvmsg(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@ipx, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/55, 0x37}, {&(0x7f0000000200)=""/216, 0xd8}, {&(0x7f0000000100)=""/133, 0x85}], 0x3, &(0x7f0000000340)=""/115, 0x73, 0x1}, 0x12040) recvmsg$kcm(r2, &(0x7f00000030c0)={&(0x7f0000002e00)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003000)=[{&(0x7f0000002e80)=""/85, 0x55}, {&(0x7f0000002f00)=""/151, 0x97}, {&(0x7f0000002fc0)=""/50, 0x32}], 0x3, &(0x7f0000003040)=""/122, 0x7a, 0x15}, 0x101) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000003100)={r2}) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000c7f000)='./file0\x00', &(0x7f0000df9000)='nfs4\x00', 0x0, &(0x7f0000590ffe)='v2') 2018/03/30 22:45:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x2, 0x0, 0x0, 0x4c}, 0xfffffffffffffd39) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x36, &(0x7f00001a7f05)=""/251}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) sendmsg(r1, &(0x7f00000001c0)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2=0xe0000002}}}, 0x80, &(0x7f0000000740)=[{&(0x7f00000005c0)="b3de34dfcc92d69cf02fea202ce6f530bb58df6d3882867683475fc5787f40d9f48dc32e97703dfb09982dc39e08407ea3a857576451f26ed4acb889cf9a2c5e31e0aa0fb6e74b31f5fd496d1f69fa0de86b6fef44b1", 0x56}], 0x1, &(0x7f0000000300)=[{0x50, 0x11b, 0x8, "03de045e9be101b1fb254800b170d10b025c0af552ee468c10a2b447e04c70da0214adbe29716051c707751e377371b5d6249eef02fb1728169fa78777ae9ada"}], 0x50, 0x4000010}, 0x40040) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r2}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000140)={r1}) [ 2656.263905] devpts: called with bogus options [ 2656.280570] devpts: called with bogus options [ 2656.287423] FAULT_INJECTION: forcing a failure. [ 2656.287423] name failslab, interval 1, probability 0, space 0, times 0 [ 2656.298837] CPU: 0 PID: 6119 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2656.306028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2656.315398] Call Trace: [ 2656.317996] dump_stack+0x194/0x24d [ 2656.321641] ? arch_local_irq_restore+0x53/0x53 [ 2656.326327] should_fail+0x8c0/0xa40 [ 2656.330049] ? perf_trace_lock_acquire+0xe3/0x980 [ 2656.334900] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2656.340011] ? trace_event_raw_event_lock+0x340/0x340 [ 2656.345222] ? perf_trace_lock+0x900/0x900 [ 2656.349473] ? mark_held_locks+0xaf/0x100 [ 2656.353642] ? __raw_spin_lock_init+0x1c/0x100 [ 2656.358240] ? find_held_lock+0x35/0x1d0 [ 2656.362314] ? __lock_is_held+0xb6/0x140 [ 2656.366396] ? check_same_owner+0x320/0x320 [ 2656.370717] ? d_alloc+0x269/0x340 [ 2656.374246] ? rcu_note_context_switch+0x710/0x710 [ 2656.379188] should_failslab+0xec/0x120 [ 2656.383151] kmem_cache_alloc+0x47/0x760 [ 2656.387195] ? d_drop+0x51/0x60 [ 2656.390454] ? rpc_i_callback+0x30/0x30 [ 2656.394405] rpc_alloc_inode+0x1a/0x20 [ 2656.398269] alloc_inode+0x65/0x180 [ 2656.401875] new_inode_pseudo+0x69/0x190 [ 2656.405914] ? prune_icache_sb+0x1a0/0x1a0 [ 2656.410134] ? do_raw_spin_trylock+0x190/0x190 [ 2656.414692] ? d_add+0xa70/0xa70 [ 2656.418041] new_inode+0x1c/0x40 [ 2656.421386] rpc_get_inode+0x20/0x1e0 [ 2656.425165] __rpc_create_common+0x5d/0x1d0 [ 2656.429460] ? __d_lookup+0x830/0x830 [ 2656.433242] rpc_populate.constprop.15+0x1ad/0x340 [ 2656.438152] rpc_fill_super+0x464/0xae0 [ 2656.442107] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2656.447276] ? security_capable+0x8e/0xc0 [ 2656.451403] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2656.456570] ? ns_capable_common+0xcf/0x160 [ 2656.460870] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2656.466036] mount_ns+0xc4/0x190 [ 2656.469385] rpc_mount+0x9e/0xd0 [ 2656.472731] mount_fs+0x66/0x2d0 [ 2656.476075] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2656.480632] ? may_umount+0xa0/0xa0 [ 2656.484234] ? _raw_read_unlock+0x22/0x30 [ 2656.488360] ? __get_fs_type+0x8a/0xc0 [ 2656.492225] do_mount+0xea4/0x2bb0 [ 2656.495740] ? __might_fault+0x110/0x1d0 [ 2656.499779] ? copy_mount_string+0x40/0x40 [ 2656.503989] ? check_same_owner+0x320/0x320 [ 2656.508291] ? __check_object_size+0x8b/0x530 [ 2656.512766] ? __might_sleep+0x95/0x190 [ 2656.516720] ? kasan_check_write+0x14/0x20 [ 2656.520936] ? _copy_from_user+0x99/0x110 [ 2656.525081] ? memdup_user+0x5e/0x90 [ 2656.528773] ? copy_mount_options+0x1f7/0x2e0 [ 2656.533245] SyS_mount+0xab/0x120 [ 2656.536675] ? copy_mnt_ns+0xb30/0xb30 [ 2656.540539] do_syscall_64+0x281/0x940 [ 2656.544403] ? vmalloc_sync_all+0x30/0x30 [ 2656.548617] ? _raw_spin_unlock_irq+0x27/0x70 [ 2656.553178] ? finish_task_switch+0x1c1/0x7e0 [ 2656.557651] ? syscall_return_slowpath+0x550/0x550 [ 2656.562556] ? syscall_return_slowpath+0x2ac/0x550 [ 2656.567462] ? prepare_exit_to_usermode+0x350/0x350 [ 2656.572455] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2656.577798] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2656.582620] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2656.587785] RIP: 0033:0x454e79 [ 2656.590951] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2656.598635] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2656.605881] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 2018/03/30 22:45:39 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x0, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2656.613125] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2656.620370] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2656.627615] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000004c [ 2656.635095] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry clntXX [ 2656.648732] devpts: called with bogus options 2018/03/30 22:45:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcd}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r0, &(0x7f0000000200)="561f4f3054c434bf90a8d8e04e8d69ff38c2c8816408963664efbf2bbbbf0bff7b4c1eff941283da86a97c8e8dfc96c20445a4da8ed1c3f037779aeeea3844580f90090f337ec7769eab6216c8d1729c499e846fb22099d6f7faa56bd1e4ae81ee383038924e0f39d1bb1dd5c457663f3f856a23684f22d14537e06d18bfbffd0c3990bffcc890282f8f3c4c63da8f831253696b7116a90ca642028db1f6896bdcfc05ed7b53d95507c3d2ae2679aefff0eee6beadc7652e86f88217b39bf41646733b2f8eac5c9b0bfefad1a37f30646f", &(0x7f0000000080)}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x4c, 0x0, 0x80000000, 0x6, r0, 0x1ff}, 0x2c) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001a80)={0xffffffffffffffff, &(0x7f00000000c0)="b822b6a7feb17359e1ce29d99a69e083392dc50ff1fb635a5849d2f5916ae2fdc24e95"}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x2, 0xc89, 0x200, 0xb5, 0x0, 0x9, 0x6004, 0x6, 0x1, 0x9, 0x7, 0x3, 0x2, 0x2, 0x8, 0x1, 0x100000000, 0x4, 0x5, 0x0, 0x0, 0x9, 0x8000, 0x9, 0x1, 0xb3b5, 0x7fffffff, 0x0, 0x5, 0x5, 0xd927, 0x8, 0x9, 0x3f, 0x5, 0x100000000, 0x0, 0x7, 0x6, @perf_bp={&(0x7f0000000040), 0x4}, 0x6106, 0x8000, 0x20, 0x0, 0x2, 0x6, 0x1}, r3, 0x4, r2, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x4, 0x2, 0x6, 0xfff, 0x10, 0xffffffffffffffff, 0x28a}, 0x2c) [ 2656.658914] overlayfs: unrecognized mount option "¯‡0#"‡”ÊƧ×éu³«ÇÃ*OcÆXùb\" or missing value 2018/03/30 22:45:39 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:39 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff", 0x28}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2656.699247] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory gssd [ 2656.733061] overlayfs: unrecognized mount option "¯‡0#"‡”ÊƧ×éu³«ÇÃ*OcÆXùb\" or missing value 2018/03/30 22:45:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000000500000000000000000000000000000000000000"], &(0x7f0000000200)='GPL\x00', 0x1, 0x99, &(0x7f00000000c0)=""/153}, 0x322) 2018/03/30 22:45:39 executing program 1 (fault-call:19 fault-nth:77): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:39 executing program 0: perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xd, 0x72c4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000140)=""/248}, 0x18) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0x50, &(0x7f00000002c0)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000280), &(0x7f0000000380)}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f00000004c0)) mkdir(&(0x7f0000000240)='./file0\x00', 0x84) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x1ee}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)={0x9, 0x2, 0x3, 0xf98, 0x2, r0, 0x6}, 0x2c) sendmsg(r2, &(0x7f0000000840)={&(0x7f0000000380)=@generic={0x4, "0da0e2defbf80ad243a09dba58e626a2c0c184691588f1fe1af75a9239fa9cd6216e578a412e08ac50ccf51aabf731a8dceebf0bebc2965b92e53eb2ca073891b33a979a007c97047a3b84eeb7fd667828ae936e6d1913b384fede92571b21a4a8ac2409e0cbbe5e523069cc4a49d7366027ba7be8f4d976e258ebcc541d"}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)="76750aa97002fe70191a85f164f576e5f8f7e771421e82f26fb5a1f68d6bd567919cb0d30364b87b355f8f681938d8c5cdc4b4b2a76383ead00c0dfa63defa50061b3e17b9f0527d163171f52e29a2b274f67aca4bc0788a711a547637d30addf5741a8bf3d36abd85b5c854f1279c97d2abd8f5e23af1ada2d80719231880c17a6ad086f2437409db626759ce209ffb3816a6773cebc4a665e05f50e0493d66db433cdbf9bfe239cac80f6bd9ab040df5a61fc668866d289c64f48278bf615c5a93e19a2d033052c5508868d8ecb3ab733fdccbe829205488d06c89bd5097bca0994e", 0xe3}, {&(0x7f0000000600)="a21a90a9b5f12f9973b64421208d168f4a335431b1b64a2fe87b0408de8454140c8d6aeddc69ecdb6d420a6387526744670b4b4107ef2a77bbb90c51c161722bbb700c22252695491055d399f5efa509a63fc95ada6afce38c5c47786390256bbc933a1249bb07329e30ba82d497aa964011fc3b521e5b8a081a87d0530d440e1b743598ab0ca0366114c87620fbd5b6039e87477a441c536225111d7534c67a46ed5f27336a6842dea2e8b02bb84f60ff2642991b5a88ce58271830813cd5a65283d37f9e2f34fdf6ad35f3909c7589ff1c24dcb8877d3f153e5159", 0xdc}, {&(0x7f0000000700)="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", 0xff}, {&(0x7f0000000400)="49f3bda2daa50d78a4dbad10fc32e8e1d0b1b5e8ee23bdf11d1280381e905a715efcd68a777979f1d11bcc336a34c977c09b61d3a15293099cedc6ec9b7de5a896f91487dafba7c997cf7d8bcbba72ca428c6437643eced46ddd341ffda5aef7491bc364c331087e5ed81894bb7fc970f91f9e6b163cb97c3d28ac8401eee40b1da070ea24dde416b56d32da2285b866", 0x90}], 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x3b8, 0x20000000}, 0x80) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) [ 2656.793056] devpts: called with bogus options [ 2656.840735] devpts: called with bogus options [ 2656.841328] devpts: called with bogus options [ 2656.981944] FAULT_INJECTION: forcing a failure. [ 2656.981944] name failslab, interval 1, probability 0, space 0, times 0 [ 2656.993361] CPU: 1 PID: 6173 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2657.000544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2657.009886] Call Trace: [ 2657.012459] dump_stack+0x194/0x24d [ 2657.016079] ? arch_local_irq_restore+0x53/0x53 [ 2657.020736] should_fail+0x8c0/0xa40 [ 2657.024427] ? unwind_next_frame.part.6+0x1a6/0xb40 [ 2657.029419] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2657.034503] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2657.039689] ? __lock_acquire+0x664/0x3e00 [ 2657.043902] ? find_held_lock+0x35/0x1d0 [ 2657.047940] ? __lock_is_held+0xb6/0x140 [ 2657.052072] ? check_same_owner+0x320/0x320 [ 2657.056368] ? __d_lookup+0x4f4/0x830 [ 2657.060146] ? rcu_note_context_switch+0x710/0x710 [ 2657.065063] should_failslab+0xec/0x120 [ 2657.069021] kmem_cache_alloc+0x47/0x760 [ 2657.073070] __d_alloc+0xc1/0xbd0 [ 2657.076499] ? shrink_dcache_for_umount+0x290/0x290 [ 2657.081492] ? d_alloc_parallel+0x1b40/0x1b40 [ 2657.085969] ? lock_release+0xa40/0xa40 [ 2657.089928] ? mark_held_locks+0xaf/0x100 [ 2657.094063] ? d_lookup+0x133/0x2e0 [ 2657.097676] ? d_lookup+0x1d5/0x2e0 [ 2657.101280] d_alloc+0x8e/0x340 [ 2657.104534] ? __d_alloc+0xbd0/0xbd0 [ 2657.108224] ? full_name_hash+0x9b/0xe0 [ 2657.112179] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2657.117430] ? down_write+0x87/0x120 [ 2657.121119] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2657.125327] ? down_read+0x150/0x150 [ 2657.129023] ? __d_lookup+0x830/0x830 [ 2657.132802] rpc_populate.constprop.15+0xa3/0x340 [ 2657.137623] rpc_fill_super+0x464/0xae0 [ 2657.141571] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2657.146743] ? security_capable+0x8e/0xc0 [ 2657.150867] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2657.156036] ? ns_capable_common+0xcf/0x160 [ 2657.160351] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2657.165514] mount_ns+0xc4/0x190 [ 2657.168857] rpc_mount+0x9e/0xd0 [ 2657.172199] mount_fs+0x66/0x2d0 [ 2657.175541] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2657.180098] ? may_umount+0xa0/0xa0 [ 2657.183700] ? _raw_read_unlock+0x22/0x30 [ 2657.187822] ? __get_fs_type+0x8a/0xc0 [ 2657.191685] do_mount+0xea4/0x2bb0 [ 2657.195200] ? __might_fault+0x110/0x1d0 [ 2657.199236] ? copy_mount_string+0x40/0x40 [ 2657.203453] ? check_same_owner+0x320/0x320 [ 2657.207752] ? __check_object_size+0x8b/0x530 [ 2657.212235] ? __might_sleep+0x95/0x190 [ 2657.216192] ? kasan_check_write+0x14/0x20 [ 2657.220401] ? _copy_from_user+0x99/0x110 [ 2657.224526] ? memdup_user+0x5e/0x90 [ 2657.228212] ? copy_mount_options+0x1f7/0x2e0 [ 2657.232681] SyS_mount+0xab/0x120 [ 2657.236114] ? copy_mnt_ns+0xb30/0xb30 [ 2657.239985] do_syscall_64+0x281/0x940 [ 2657.243849] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 2657.249362] ? syscall_return_slowpath+0x550/0x550 [ 2657.254274] ? syscall_return_slowpath+0x2ac/0x550 [ 2657.259180] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2657.264529] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2657.269356] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2657.274520] RIP: 0033:0x454e79 2018/03/30 22:45:40 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000040)='-\x00') ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xfff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="5c766d6e65743124766d6e657431c82400") mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00000000c0)) 2018/03/30 22:45:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xbc, 0xffffffffffffffff}, 0xfffffffffffffd53) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000a12fb8)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="2c01000000200000000000000000254bbb5fb8a38edd5dd03b4d07"], &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfff1, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xa, 0xa9, &(0x7f0000000000)="219a9cdf8924cb707fd6", &(0x7f0000000040)=""/169, 0x2, 0x5}, 0x28) 2018/03/30 22:45:40 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x0, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:40 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:40 executing program 3: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x4, 0x7, &(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001680)={r1}) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000580)=""/37, 0x25}], 0x1, &(0x7f0000000800)=""/27, 0x1b, 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000052c0)={&(0x7f0000004f40)=@ll={0x11, 0x5da1e49052ee8435, 0x0, 0x1, 0x5, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x18}}, 0x80, &(0x7f0000005200)=[{&(0x7f0000004fc0)="0a295dc2bdcaec4195822c4d6f66913da9651c9633f186fda68f8a6dcaa27b675eeedec48472e8b7de209853495c14bae1bfa27314749c3b45a0d2e830c3f13c0c3956fcc43926d45994c98c24dcc9bc246c986fadd44bf04f4471ae5c4b26339220def5e661ede600dadacdb8aa87f2", 0x70}], 0x1, &(0x7f0000005240)=ANY=[]}, 0x10) mount(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000280)='autofs\x00', 0x3, &(0x7f0000000240)='\x00') socketpair(0x10, 0x2, 0x9, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r4, &(0x7f00000006c0)={&(0x7f0000000300)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000380)="3df7035790bd4760f20fb15d76e20b5e6d54661a8ae79aaeb7fb572c22357bb7014a5bf268e235f06129417a56dac22f42004e41f2e37b81fdeb4233c8da700471859ba683a78d1aabe6ba3efe7ca574a86f919201cd3be7cbd786c1bdecaa0e96477cc0e454c8e7a812f30447c5e3d13741b8110e7534c70605e7bc9337025278285a4b384c37b66788812e6cee4a554bc40a2ac67a136ac1ebcb4f75390d5aa40c0e64fe6b0854181328796b17d74426c36799c97cb9ef8fa2e78c41380e23494c5db5ff177a67d3b797905a7eb6a6dfced22da96f900e5198de1c64c7ceee0a8675ec8cfe746f5e59eba3c3e9", 0xee}], 0x1, &(0x7f0000000a40), 0x0, 0x800}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1/file0\x00', 0x0, 0x10}, 0x4) mount(&(0x7f0000000e40)='./file1/file0\x00', &(0x7f0000000e80)='./file1/file0\x00', &(0x7f0000000ec0)='hfs\x00', 0x20, &(0x7f0000001080)="36a112aee578441e286cc37ecb38c9863ae72169954b6da7240ed94ec12f7a481268022d55c173062037f392f3ccc49cf5f4fa4386a10630ae4e83008b255d78b5ae9e6eec1b33ee3c0db6791d54d4d9d07a0f6c5a3e7c047780c341071459ee42380f336cc46ef46f7526a1c1153674ecdccb6352a673066d5d9919eb8563c73f8b97461bb42e85aae2bcf4c951c70b1ce1e0bb07a59b51889aeb3e0544c4c8b26d9de50369d43c2ebbbee9c0985ff500c34278e95f43abcfe1ce74f51acfebaedb28a491a892e94d75405d") socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000a00)) close(r1) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file1/file0\x00', 0x0, 0x18}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000000000000500000000000000000000000000000095000000ec0000008e2e4f6f914d67da1a112777fddc6f9bd679fb6ae7fa7baec77c1bd3b2000000000000000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000740)=r6, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000e00)={&(0x7f0000000140)='./file1\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r4, 0x0, 0x6d, 0x63, &(0x7f0000000780)="611fd17bae8aa02ba4c9ad8cfe96b40fad456dc726fbf59eb3bca0feaedcfcb5f1809f621bf00f3e51e16a1806b4b44091840c5e5dcb0e63e55c3c003e51805b74bc006cf441096cdc97149b1f20e0eac6928391e671eeecc294774111547b6529923bb05fe643b5cd34aeb4ea", &(0x7f0000000600)=""/99, 0xfffffffffffff800, 0x9}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000001180)={r5}) recvmsg$kcm(r5, &(0x7f0000000dc0)={&(0x7f0000000880)=@in6={0x0, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000900)=""/57, 0x39}, {&(0x7f0000000940)=""/63, 0x3f}, {&(0x7f0000000a40)=""/162, 0xa2}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f00000009c0)=""/21, 0x15}, {&(0x7f0000000b00)=""/84, 0x54}, {&(0x7f0000000b80)=""/87, 0x57}, {&(0x7f0000000c00)=""/125, 0x7d}, {&(0x7f0000000c80)=""/62, 0x3e}], 0x9, &(0x7f0000000d80)=""/3, 0x3, 0x1}, 0x2100) 2018/03/30 22:45:40 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a", 0x2f}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2657.277681] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2657.285450] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2657.292693] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2657.299935] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2657.307180] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2657.314424] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000004d [ 2657.321773] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory gssd 2018/03/30 22:45:40 executing program 0: socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0xc, r0, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x7fffffff, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x7, 0x0, 0x7, 0x6}, r2, 0xa, r0, 0x1) r3 = gettid() r4 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r3, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r3, 0xf, r1, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r3, 0xd, r4, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x1000020, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000001d00)='./file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x201801, &(0x7f0000001e00)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000380)=ANY=[@ANYBLOB="5c1100002045c2ec6400000000000000303feefcd8ed6d9f596a73287f29fd0fdfc6d7eb01040000da2e80a190a763f4ec976684e98d23fc9e39f875158d5454b47a04452898d9726587c92418e559e7e237b26e4e0c77693b8263a7d8c2f8092e06111a64572699cc93"]) mkdir(&(0x7f00000001c0)='./file0\x00', 0x4) sendmsg(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000500)="82e2c9a73c0d7e4448db5a051683669f051fcb6a7fc01379f2cf4dd6a0526f725b7dd95e131d15037f9e11505b1391d792b26b6d78b38e76178e7312ffbf22f0094c24e270077769f499a425a0d16dc8", 0x50}], 0x1, 0x0, 0x0, 0x8000}, 0x1) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000580)=@l2, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/175, 0xaf}], 0x1, &(0x7f00000008c0)=""/186, 0xba, 0x5}, 0x40) 2018/03/30 22:45:40 executing program 1 (fault-call:19 fault-nth:78): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) [ 2657.373856] autofs4:pid:6183:autofs4_fill_super: called with bogus options [ 2657.410552] devpts: called with bogus options [ 2657.416146] autofs4:pid:6183:autofs4_fill_super: called with bogus options [ 2657.426537] devpts: called with bogus options 2018/03/30 22:45:40 executing program 4: mkdir(&(0x7f0000003dc0)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000003d40)={&(0x7f0000003d00)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000026c0)='./file0/file0\x00', &(0x7f0000002700)='./file0/file1\x00', &(0x7f0000002740)='selinuxfs\x00', 0x4000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mkdir(&(0x7f00000044c0)='./file0/file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000046c0)={&(0x7f0000004680)='./file0/file2\x00', 0x0, 0x8}, 0xfffffffffffffe57) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000004480)={r0, &(0x7f0000004500)="17c3b4bf0f009920184b34e120312adbf0adbd139185f6c7820b2ae55e319748c102af41078d26eccde7c04685fbedb3adedb10c3c16da3b15b267ec3e4eee6f2bf0f6a53d216be390289ecec7017d"}, 0x10) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000004980)={&(0x7f0000004700)='./file0/file1\x00', 0x0, 0xf}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='aufs\x00', 0x30400, &(0x7f0000000480)="cd7fe75366440233e9a1b0cb0029c7c27528c3f5cdca89ebea4c4364662a1956824e2be8db6add9edc6f01f0b472297d6269e90738ab0339859a3b2bcb9564cfe470e758db7634b6ebbe4f79f810a80530b480238bd142fa8feeadc0cd81ce166c12fa74162c99ff193aab06e3e577126566c604ab1c140b926e0aa251d52c47495e6cec6989cda6b1f3bdf5f9379fceb60e23081cf49ed2726c83") bpf$PROG_LOAD(0x5, &(0x7f0000004ac0)={0xf, 0x0, &(0x7f0000004b40)=ANY=[], &(0x7f0000000280)="73027a6b846c6c650000", 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000004580)=ANY=[@ANYBLOB="180000000000000000000000000000000500000000000000008000000000000095000000000000008de236fcc687d96e0364302955ca4a0bcfc55c0269e44ba09897e800bf26bcfa22975e3484d06d8ccc855d6e155202be7af0eeb875994f02ce5edc0b40331e46f222330acbeef5b493a8587c05d1d6da38f71f06027b1a2173d6861745f4555b415c271365048cf1569da8e3c5effe71a0dc827dc0f757530ccf71a9b4d0d7a7bbe3efe38032be6384ad14592043f8f3a2676d8477f50016f48821e1bbad7ec8853d56"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0x0, 0x6e, &(0x7f0000004900), &(0x7f00000000c0)=""/110, 0x1000000}, 0x28) r2 = socket$kcm(0x29, 0xfd17dc2d8fc45819, 0x0) recvmsg(r2, &(0x7f0000002680)={&(0x7f0000000540)=@can, 0x80, &(0x7f0000001640)=[{&(0x7f00000005c0)=""/95, 0x5f}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x2, &(0x7f0000001680)=""/4096, 0x1000, 0x20000000000}, 0x21) recvmsg(r2, &(0x7f0000003cc0)={0x0, 0x0, &(0x7f0000003bc0)=[{&(0x7f0000002900)=""/29, 0x1d}, {&(0x7f0000002940)=""/32, 0x20}, {&(0x7f0000002980)=""/203, 0xcb}, {&(0x7f0000002ac0)=""/207, 0xcf}, {&(0x7f0000002bc0)=""/4096, 0x1000}], 0x5, &(0x7f0000003c40)=""/98, 0x62, 0xdfee}, 0x1) mount(&(0x7f0000002780)='./file0/file2\x00', &(0x7f00000027c0)='./file0/file1\x00', &(0x7f0000002800)='v7\x00', 0x1000000, &(0x7f0000002840)="edcc947cc3233cb218d496c966d2c7409949b9eaa565b16b6a47e95877b2b8961ff8faa08dace4ea8de486780e0f9316ee1fa968c4b73234bc51d702ec0c75fbc6c4a09765fe3e0a1f5f41a2a77b072eb6ad8e6b5d8d3080c3213b484ddb02510e6f01808543736769104e174a2058ea78667ce8c7d439bbf37569cd712a44c70ec032c55d9a63e1d14b923adbc68edfb000f3f3") r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000004400)={&(0x7f0000002a80)='./file0/file2\x00', 0x0, 0x8}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000048c0)={r3, &(0x7f0000004840)="eb965ed8a8029e8972c49de45e378c95b6b93e525540e29730a1abb47c7f0dcdbb4a2ecea5de242ef445f93ad4abc385011e87bfc6fd9ed5931e723559f4af9b2cf98527bc8af5760fb0dd49c54e2721af4daa5005f1536b69a30d140cb43c50108188"}, 0x10) recvmsg(r2, &(0x7f0000004800)={&(0x7f0000003e00)=@rc, 0x80, &(0x7f0000004900)=[{&(0x7f0000003e80)=""/165, 0xa5}, {&(0x7f0000004740)=""/145, 0x91}, {&(0x7f0000004000)=""/252, 0xfc}, {&(0x7f00000002c0)=""/27, 0x1b}, {&(0x7f0000004100)=""/36, 0x24}, {&(0x7f0000004140)=""/136, 0x88}, {&(0x7f0000004200)=""/195, 0xc3}], 0x7, &(0x7f0000004380)=""/80, 0x50, 0x40}, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003f80)={&(0x7f0000003f40)='./file0/file1\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xd, 0x6d3a, 0x36443300, 0x4, 0x8, r0, 0x1ff}, 0x2c) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000380)='ocfs2_dlmfs\x00', 0x2000, &(0x7f0000000400)) mkdir(&(0x7f0000003d80)='./file0\x00', 0x100) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) [ 2657.457784] devpts: called with bogus options [ 2657.468138] FAULT_INJECTION: forcing a failure. [ 2657.468138] name failslab, interval 1, probability 0, space 0, times 0 [ 2657.479607] CPU: 0 PID: 6201 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2657.486804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2657.496164] Call Trace: [ 2657.498767] dump_stack+0x194/0x24d [ 2657.502410] ? arch_local_irq_restore+0x53/0x53 [ 2657.507092] should_fail+0x8c0/0xa40 [ 2657.510826] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2657.515947] ? trace_event_raw_event_lock+0x340/0x340 [ 2657.521147] ? __lock_is_held+0xb6/0x140 [ 2657.526098] ? mark_held_locks+0xaf/0x100 [ 2657.530254] ? __raw_spin_lock_init+0x1c/0x100 [ 2657.534825] ? find_held_lock+0x35/0x1d0 [ 2657.538872] ? __lock_is_held+0xb6/0x140 [ 2657.542924] ? check_same_owner+0x320/0x320 [ 2657.547227] ? d_alloc+0x269/0x340 [ 2657.550747] ? rcu_note_context_switch+0x710/0x710 [ 2657.555654] ? lock_release+0xa40/0xa40 [ 2657.559613] should_failslab+0xec/0x120 [ 2657.563578] kmem_cache_alloc+0x47/0x760 [ 2657.567625] ? d_drop+0x51/0x60 [ 2657.570887] ? rpc_i_callback+0x30/0x30 [ 2657.574839] rpc_alloc_inode+0x1a/0x20 [ 2657.578703] alloc_inode+0x65/0x180 [ 2657.582311] new_inode_pseudo+0x69/0x190 [ 2657.586352] ? prune_icache_sb+0x1a0/0x1a0 [ 2657.590566] ? do_raw_spin_trylock+0x190/0x190 [ 2657.595128] ? d_add+0xa70/0xa70 [ 2657.598479] new_inode+0x1c/0x40 [ 2657.601824] rpc_get_inode+0x20/0x1e0 [ 2657.605604] __rpc_create_common+0x5d/0x1d0 [ 2657.609905] ? __d_lookup+0x830/0x830 [ 2657.613690] rpc_populate.constprop.15+0x1ad/0x340 [ 2657.618606] rpc_fill_super+0x464/0xae0 [ 2657.622566] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2657.627740] ? security_capable+0x8e/0xc0 [ 2657.631870] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2657.637044] ? ns_capable_common+0xcf/0x160 [ 2657.641346] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2657.646517] mount_ns+0xc4/0x190 [ 2657.649864] rpc_mount+0x9e/0xd0 [ 2657.653210] mount_fs+0x66/0x2d0 [ 2657.656569] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2657.661129] ? may_umount+0xa0/0xa0 [ 2657.664735] ? _raw_read_unlock+0x22/0x30 [ 2657.668861] ? __get_fs_type+0x8a/0xc0 [ 2657.672732] do_mount+0xea4/0x2bb0 [ 2657.676250] ? __might_fault+0x110/0x1d0 [ 2657.680295] ? copy_mount_string+0x40/0x40 [ 2657.684511] ? check_same_owner+0x320/0x320 [ 2657.688812] ? __check_object_size+0x8b/0x530 [ 2657.693290] ? __might_sleep+0x95/0x190 [ 2657.697250] ? kasan_check_write+0x14/0x20 [ 2657.701465] ? _copy_from_user+0x99/0x110 [ 2657.705595] ? memdup_user+0x5e/0x90 [ 2657.709285] ? copy_mount_options+0x1f7/0x2e0 [ 2657.713763] SyS_mount+0xab/0x120 [ 2657.717204] ? copy_mnt_ns+0xb30/0xb30 [ 2657.721073] do_syscall_64+0x281/0x940 [ 2657.724939] ? vmalloc_sync_all+0x30/0x30 [ 2657.729065] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 2657.734582] ? syscall_return_slowpath+0x550/0x550 [ 2657.739489] ? syscall_return_slowpath+0x2ac/0x550 [ 2657.744410] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2657.749757] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2657.754582] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2657.759748] RIP: 0033:0x454e79 [ 2657.762917] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2657.770605] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2657.777855] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2657.785102] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2657.792353] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2657.799602] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000004e 2018/03/30 22:45:40 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x0, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:40 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a", 0x2f}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) recvmsg(r1, &(0x7f0000001400)={&(0x7f0000000280)=@can={0x0, 0x0}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/224, 0xe0}], 0x2, 0x0, 0x0, 0x3}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0xb, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, [@alu={0x4, 0x7, 0xe, 0xf, 0x7, 0x4, 0xfffffffffffffffc}], {0x95}}, &(0x7f0000000080)='syzkaller\x00', 0x6784, 0x18, &(0x7f00000000c0)=""/24, 0x41f00, 0x0, [], r2}, 0x48) recvmsg(r1, &(0x7f0000000140)={0x0, 0x62, &(0x7f0000000340), 0x0, &(0x7f0000000180)=""/255, 0xff}, 0x40) recvmsg(r1, &(0x7f0000001840)={&(0x7f00000014c0)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001700)=[{&(0x7f0000001540)=""/228, 0xe4}, {&(0x7f0000001640)=""/189, 0xbd}], 0x2, &(0x7f0000001740)=""/248, 0xf8, 0x8}, 0x40) 2018/03/30 22:45:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x35}, [], {0x95}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) [ 2657.807130] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry clntXX [ 2657.841209] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory gssd 2018/03/30 22:45:40 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x0, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) recvmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000400)=@ipx, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000680)=""/240, 0xf0}, {&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000580)=""/76, 0x4c}, {&(0x7f0000000200)=""/16, 0x10}, {&(0x7f0000000c00)=""/74, 0x4a}, {&(0x7f0000000280)=""/47, 0x2f}, {&(0x7f0000000c80)=""/80, 0x50}, {&(0x7f0000000d00)=""/227, 0xe3}], 0x8, &(0x7f0000000e80)=""/217, 0xd9, 0x4}, 0x140) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 22:45:40 executing program 1 (fault-call:19 fault-nth:79): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) 2018/03/30 22:45:40 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2657.943598] devpts: called with bogus options 2018/03/30 22:45:40 executing program 4: socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0xff, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x800000006, 0x10001, 0x1000, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x914b, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r2, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r2, 0xd, r3, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x1000020, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000001d00)='./file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d5") socketpair$inet(0x2, 0x3, 0x5, &(0x7f0000000680)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) r4 = getpid() r5 = perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x5, 0x0, 0x40, 0x8e, 0x0, 0x101, 0x100, 0xe, 0xff, 0x2, 0x10001, 0x3cf, 0x7, 0x1, 0x6, 0x800, 0x0, 0xffb, 0x400000000000000, 0x7, 0x80000000, 0x20, 0x5, 0x97, 0x1, 0x8, 0x10000, 0x0, 0x8, 0x0, 0x9, 0x5, 0x6, 0x8, 0x100000001, 0x2, 0x0, 0x9, 0x7, @perf_config_ext={0x40, 0x3}, 0x30121, 0x5, 0x71, 0x3, 0x6, 0x8, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) r6 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x8001, 0x3, 0xdf6f, 0x8, 0x0, 0x7f, 0xc8000, 0x1, 0x7b1866b0, 0x3, 0x4, 0x2, 0x0, 0x40, 0x10000, 0xfffffffffffffffd, 0xff, 0x41, 0x3, 0xed68, 0x8, 0x7, 0x3, 0x4, 0x4, 0x3ff, 0xfffffffffffffffa, 0xfcfd, 0x1, 0x7, 0x7f, 0x101, 0x3, 0x1, 0x400, 0x0, 0x0, 0x2, 0x6, @perf_bp={&(0x7f00000001c0), 0x5}, 0x189, 0x1000, 0x9, 0x2, 0x7, 0x3}, r4, 0xd, r5, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=ANY=[@ANYBLOB="180000000008000000000000000000400000000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0xf, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x1, 0x1, 0x6, 0xe, 0x4, 0x0, 0x18}, @exit={0x95}, @map={0x18, 0x0, 0x1, 0x0, r6}, @jmp={0x5, 0x7, 0x5232b7eaebe113a6, 0xf, 0x7, 0xfffffff4, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x11}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8}], {0x95}}, &(0x7f0000000380)='syzkaller\x00', 0x2, 0x99, &(0x7f00000003c0)=""/153, 0x0, 0x1}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0xfffffc61) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x13, 0x5, 0x0, 0xcc10, 0x4, 0xffffffffffffffff, 0x6}, 0x2c) socketpair(0x5, 0x3, 0x40, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) [ 2657.987439] devpts: called with bogus options [ 2658.005285] FAULT_INJECTION: forcing a failure. [ 2658.005285] name failslab, interval 1, probability 0, space 0, times 0 [ 2658.016840] CPU: 1 PID: 6237 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2658.024029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2658.033383] Call Trace: [ 2658.035986] dump_stack+0x194/0x24d [ 2658.039625] ? arch_local_irq_restore+0x53/0x53 [ 2658.044314] should_fail+0x8c0/0xa40 [ 2658.048046] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2658.053163] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2658.058369] ? __lock_acquire+0x664/0x3e00 [ 2658.062620] ? __lock_acquire+0x664/0x3e00 [ 2658.065671] devpts: called with bogus options [ 2658.066862] ? find_held_lock+0x35/0x1d0 [ 2658.075426] ? __lock_is_held+0xb6/0x140 [ 2658.079496] ? check_same_owner+0x320/0x320 [ 2658.083812] ? __d_lookup+0x4f4/0x830 [ 2658.087599] ? rcu_note_context_switch+0x710/0x710 [ 2658.092515] should_failslab+0xec/0x120 [ 2658.096479] kmem_cache_alloc+0x47/0x760 [ 2658.100526] __d_alloc+0xc1/0xbd0 [ 2658.103956] ? shrink_dcache_for_umount+0x290/0x290 [ 2658.108950] ? d_alloc_parallel+0x1b40/0x1b40 [ 2658.113426] ? lock_release+0xa40/0xa40 [ 2658.117377] ? mark_held_locks+0xaf/0x100 [ 2658.121499] ? d_lookup+0x133/0x2e0 [ 2658.125105] ? d_lookup+0x1d5/0x2e0 [ 2658.128714] ? current_kernel_time64+0x1d4/0x2f0 [ 2658.133445] d_alloc+0x8e/0x340 [ 2658.136699] ? __d_alloc+0xbd0/0xbd0 [ 2658.140389] ? full_name_hash+0x9b/0xe0 [ 2658.144354] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2658.149605] ? down_write_nested+0x8b/0x120 [ 2658.153901] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2658.158109] ? _down_write_nest_lock+0x120/0x120 [ 2658.162838] ? __d_lookup+0x830/0x830 [ 2658.166615] rpc_mkpipe_dentry+0xf8/0x360 [ 2658.170740] rpc_fill_super+0x85e/0xae0 [ 2658.174690] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2658.179856] ? security_capable+0x8e/0xc0 [ 2658.183979] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2658.189147] ? ns_capable_common+0xcf/0x160 [ 2658.193446] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2658.198614] mount_ns+0xc4/0x190 [ 2658.201960] rpc_mount+0x9e/0xd0 [ 2658.205303] mount_fs+0x66/0x2d0 [ 2658.208650] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2658.213208] ? may_umount+0xa0/0xa0 [ 2658.216810] ? _raw_read_unlock+0x22/0x30 [ 2658.220933] ? __get_fs_type+0x8a/0xc0 [ 2658.224798] do_mount+0xea4/0x2bb0 [ 2658.228314] ? __might_fault+0x110/0x1d0 [ 2658.232352] ? copy_mount_string+0x40/0x40 [ 2658.236563] ? check_same_owner+0x320/0x320 [ 2658.240862] ? __check_object_size+0x8b/0x530 [ 2658.245335] ? __might_sleep+0x95/0x190 [ 2658.249287] ? kasan_check_write+0x14/0x20 [ 2658.253498] ? _copy_from_user+0x99/0x110 [ 2658.257623] ? memdup_user+0x5e/0x90 [ 2658.261311] ? copy_mount_options+0x1f7/0x2e0 [ 2658.265783] SyS_mount+0xab/0x120 [ 2658.269210] ? copy_mnt_ns+0xb30/0xb30 [ 2658.273074] do_syscall_64+0x281/0x940 [ 2658.276938] ? vmalloc_sync_all+0x30/0x30 [ 2658.281067] ? _raw_spin_unlock_irq+0x27/0x70 [ 2658.285537] ? finish_task_switch+0x1c1/0x7e0 [ 2658.290010] ? syscall_return_slowpath+0x550/0x550 [ 2658.294920] ? syscall_return_slowpath+0x2ac/0x550 [ 2658.299827] ? prepare_exit_to_usermode+0x350/0x350 [ 2658.304818] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2658.310167] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2658.314987] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2658.320152] RIP: 0033:0x454e79 [ 2658.323317] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2658.331003] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 2018/03/30 22:45:41 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0x0, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:41 executing program 0: socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r2 = gettid() r3 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r2, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x27) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) perf_event_open(&(0x7f0000001c80)={0x2, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x0, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r2, 0xf, r1, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x0, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r2, 0xd, r3, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x1000020, 0x0) mkdir(&(0x7f0000001fc0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000001d00)='./file1\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985216c941be0013a569575f8b267468fe262194491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d5") socketpair$inet(0x2, 0x3, 0x5, &(0x7f0000000680)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) r4 = getpid() r5 = perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x5, 0x0, 0x40, 0x8e, 0x0, 0x101, 0x100, 0xe, 0xff, 0x2, 0x10001, 0x3cf, 0x7, 0x1, 0x6, 0x800, 0x0, 0xffb, 0x400000000000000, 0x7, 0x80000000, 0x20, 0x5, 0x97, 0x1, 0x8, 0x10000, 0x0, 0x8, 0x0, 0x9, 0x5, 0x6, 0x8, 0x100000001, 0x2, 0x0, 0x9, 0x7, @perf_config_ext={0x40, 0x3}, 0x30121, 0x5, 0x71, 0x3, 0x6, 0x8, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) r6 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x8001, 0x3, 0xdf6f, 0x8, 0x0, 0x7f, 0xc8000, 0x1, 0x7b1866b0, 0x3, 0x4, 0x2, 0x0, 0x40, 0x10000, 0xfffffffffffffffd, 0xff, 0x41, 0x3, 0xed68, 0x8, 0x7, 0x3, 0x4, 0x4, 0x3ff, 0xfffffffffffffffa, 0xfcfd, 0x1, 0x7, 0x7f, 0x101, 0x3, 0x1, 0x400, 0x0, 0x0, 0x2, 0x6, @perf_bp={&(0x7f00000001c0), 0x5}, 0x189, 0x1000, 0x9, 0x2, 0x7, 0x3}, r4, 0xd, r5, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={&(0x7f00000000c0)='./file0/file0\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=ANY=[@ANYBLOB="180000000008000000000000000000400000000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000ffff00000000000006000000c94e00001800000000000000000000009500000000000000000000000000000018100000", @ANYRES32=r6, @ANYBLOB="00000000000000006d7ff4fffcffffff000000000000000085000000110000000000000000000000180000000800000000000000002212ec540bf189933facf2"], &(0x7f0000000380)='syzkaller\x00', 0x2, 0x99, &(0x7f00000003c0)=""/153, 0x0, 0x1}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0xfffffc61) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x13, 0x5, 0x0, 0xcc10, 0x4, 0xffffffffffffffff, 0x6}, 0x2c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) 2018/03/30 22:45:41 executing program 2: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xf, 0xea, 0xdb, 0x5, 0x2, r0, 0x3}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x3, 0x3, 0xe58f, 0x10, 0x1, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xc, 0x3, 0x8, 0x2, 0xb, r1, 0x2}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x8002, 0x0, r2, 0x0, [0x115]}, 0x2c) [ 2658.338255] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2658.345499] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2658.352743] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2658.360838] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000004f [ 2658.443623] devpts: called with bogus options 2018/03/30 22:45:41 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a", 0x2f}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:41 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb110405") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000400)={0xffffffffffffff9c}) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000012c0)={r5}) close(r0) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c00)=""/59, 0x3b}, {&(0x7f0000000c40)=""/231, 0xe7}], 0x2, 0x0, 0x0, 0x4df}, 0x10020) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r8, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x89e2, &(0x7f0000000540)={r8}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r8}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r6, 0x28, &(0x7f0000000800)}, 0x10) sendmsg(r12, &(0x7f0000000140)={&(0x7f00000002c0)=@generic={0x5, "75c7e4abedf0b29c40c1f8686438870d47836866594edb347d13e6961c1570f91637408d94cc04ad7ecfe06d2eb757cd83a8611651a20e6425912e602e9b28996d271bc7223186f57f758157b192854dfb469683532e100e6f626e3b3d3056a115fde01eb513725f9541fece304e22093b493ff10681bcf17a359674c5c1"}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) recvmsg(r12, &(0x7f0000001140)={&(0x7f0000000f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/211, 0xd3}], 0x1, 0x0, 0x0, 0x6}, 0x40) close(r9) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x9, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000050000000059ddbca9ffffffbf298000f8ffffff0040000000000000850000001b04000000000000005d9c691fc437be0000000000000004001000099500ddffffbf00eed197d2a75997c6e8278862fe27f36a4bd4f08448f1c4ca0949122fe34b980c184597e4ec9c29f4010b4ce032c11ad014a7525419d742b9c1a7e1f9d64da7ccecc5dd62a2e1240c504b34bc5aaa19989553ce0a26def084504f81b24979589fcf90457e4ae1f48800000000000077756cc775dd6f622e4e58bbf344be5b6c09c8b15182380f98e54559c3ed5fffdab2e585b42de6172044dcac4ad212325e57f4c9c9c06823c142a64f1aca0d7bcb07a05b0a3a4137bf4fb32fe78efab0c75b442889dd9dd752a776fdd9570f7ee8c45dba6b421d376a3f4297850fe4825f0946b7e6cf947f37d0325f9a9bf48345fa37cba57c9b9bda7722a2251fbb6fe7243f57ac21b6cf63bcffce59ebae7c18de0e5c20842629109a2d291ad0f13d0ecc6207a7bd4d9937967e306cbbeb3662517365fa7934b5aeb196b6051b0c63158d087c15868c6eaa8c04de719279a6ece0c523468545943769156a9ff081404153bb0319e8d912c91462d7df3bd90c5640a1dd6415932a36e3ab9373bc117bcd03c36b23e013881eb81b7ecd4c10113d6aa2"], &(0x7f0000001840)='syzkaller\x00', 0x3d, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x0, [], r13}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xa, 0x13, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x1b}, @call={0x85, 0x0, 0x0, 0x12}, @generic={0xffff, 0x6, 0xffffffff7fffffff, 0x257c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x8001, 0xb, 0x1, 0x0, 0xfffffffe, 0x8}, @ldst={0x0, 0x2, 0x6, 0x7, 0xf, 0xffffffff, 0xfffffffffffffffc}, @ldst={0x3, 0x0, 0x3, 0xf, 0x7, 0x5e, 0xffffffffffffffff}, @map={0x18, 0xa, 0x1, 0x0, r11}], {0x95}}, &(0x7f0000000640)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000680)=""/216, 0x40f00, 0x1, [], r13}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000d80)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) 2018/03/30 22:45:41 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:41 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x6, 0x8, 0xef7, 0x40, 0x4, r0, 0x7}, 0x2c) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000002c0)='./file1\x00', 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") r4 = gettid() perf_event_open(&(0x7f0000000c00)={0x0, 0x70, 0x1b15715f, 0x5, 0x9, 0x0, 0x0, 0x5, 0x80010, 0x8, 0x1, 0x5, 0x100000001, 0x0, 0xfff, 0x5, 0x0, 0x3, 0xea87, 0x401, 0x5, 0x3, 0x4, 0x80000001, 0x9, 0xa372, 0x4e76, 0x80000000, 0x7fff, 0x7f, 0x8a, 0x400, 0xf1, 0x7, 0x3, 0x7, 0x3, 0x3ff, 0x0, 0x2, 0x4, @perf_config_ext={0x4, 0x1ec}, 0x412, 0x8, 0x0, 0x3, 0x80, 0x4, 0x9}, r4, 0x0, r2, 0x1) 2018/03/30 22:45:41 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="0600000000000000000000000000000000000000000000000406000000"]) 2018/03/30 22:45:41 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0x0, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:41 executing program 0: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x3ff) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x2, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x800, 0xfffffffffffff800, 0x0, 0x8, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x10000, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r2, 0x1, r1, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb1104058d8843") close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000009b40)={&(0x7f0000009640)=@can={0x0, 0x0}, 0x80, &(0x7f0000009a80)=[{&(0x7f000000a080)=""/4096, 0x1000}, {&(0x7f00000096c0)=""/104, 0x68}, {&(0x7f0000009740)=""/218, 0xda}, {&(0x7f0000009840)=""/93, 0x5d}, {&(0x7f00000098c0)=""/172, 0xac}, {&(0x7f0000009980)=""/57, 0x39}, {&(0x7f00000099c0)=""/60, 0x3c}, {&(0x7f0000009a00)=""/119, 0x77}], 0x8, &(0x7f0000009b00)=""/52, 0x34, 0x7}, 0x2000) sendmsg$kcm(r3, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, r4, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000002c0)={r3}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) 2018/03/30 22:45:41 executing program 1 (fault-call:19 fault-nth:80): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) [ 2658.629212] devpts: called with bogus options [ 2658.640566] FAULT_INJECTION: forcing a failure. [ 2658.640566] name failslab, interval 1, probability 0, space 0, times 0 [ 2658.651875] CPU: 0 PID: 6291 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2658.659240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2658.659744] xprt_adjust_timeout: rq_timeout = 0! [ 2658.668612] Call Trace: [ 2658.668634] dump_stack+0x194/0x24d [ 2658.668648] ? arch_local_irq_restore+0x53/0x53 [ 2658.668671] should_fail+0x8c0/0xa40 [ 2658.668687] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2658.668701] ? perf_trace_lock+0x900/0x900 [ 2658.668708] ? __lock_acquire+0x664/0x3e00 [ 2658.668720] ? __lock_acquire+0x664/0x3e00 [ 2658.668735] ? find_held_lock+0x35/0x1d0 [ 2658.696313] xprt_adjust_timeout: rq_timeout = 0! [ 2658.697362] ? __lock_is_held+0xb6/0x140 [ 2658.697385] ? check_same_owner+0x320/0x320 [ 2658.697397] ? __d_lookup+0x4f4/0x830 [ 2658.697417] ? rcu_note_context_switch+0x710/0x710 [ 2658.697434] should_failslab+0xec/0x120 [ 2658.735605] kmem_cache_alloc+0x47/0x760 [ 2658.739652] __d_alloc+0xc1/0xbd0 [ 2658.743082] ? shrink_dcache_for_umount+0x290/0x290 [ 2658.748075] ? d_alloc_parallel+0x1b40/0x1b40 [ 2658.752551] ? lock_release+0xa40/0xa40 [ 2658.756505] ? mark_held_locks+0xaf/0x100 [ 2658.760629] ? d_lookup+0x133/0x2e0 [ 2658.764237] ? d_lookup+0x1d5/0x2e0 [ 2658.767839] d_alloc+0x8e/0x340 [ 2658.771096] ? __d_alloc+0xbd0/0xbd0 [ 2658.774787] ? full_name_hash+0x9b/0xe0 [ 2658.778742] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2658.783994] ? down_write_nested+0x8b/0x120 [ 2658.788320] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2658.792531] ? _down_write_nest_lock+0x120/0x120 [ 2658.797263] ? __d_lookup+0x830/0x830 [ 2658.801046] rpc_mkpipe_dentry+0xf8/0x360 [ 2658.805171] rpc_fill_super+0x85e/0xae0 [ 2658.809124] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2658.814295] ? security_capable+0x8e/0xc0 [ 2658.818426] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2658.823591] ? ns_capable_common+0xcf/0x160 [ 2658.827890] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2658.833059] mount_ns+0xc4/0x190 [ 2658.836407] rpc_mount+0x9e/0xd0 [ 2658.839760] mount_fs+0x66/0x2d0 [ 2658.843105] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2658.847662] ? may_umount+0xa0/0xa0 [ 2658.851265] ? _raw_read_unlock+0x22/0x30 [ 2658.855390] ? __get_fs_type+0x8a/0xc0 [ 2658.859259] do_mount+0xea4/0x2bb0 [ 2658.862776] ? __might_fault+0x110/0x1d0 [ 2658.866819] ? copy_mount_string+0x40/0x40 [ 2658.871035] ? __check_object_size+0x8b/0x530 [ 2658.875509] ? __might_sleep+0x95/0x190 [ 2658.879463] ? kasan_check_write+0x14/0x20 [ 2658.883676] ? _copy_from_user+0x99/0x110 [ 2658.887807] ? memdup_user+0x5e/0x90 [ 2658.891497] ? copy_mount_options+0x1f7/0x2e0 [ 2658.895969] SyS_mount+0xab/0x120 [ 2658.899403] ? copy_mnt_ns+0xb30/0xb30 [ 2658.903269] do_syscall_64+0x281/0x940 [ 2658.907131] ? vmalloc_sync_all+0x30/0x30 [ 2658.911262] ? _raw_spin_unlock_irq+0x27/0x70 [ 2658.915734] ? finish_task_switch+0x1c1/0x7e0 [ 2658.920216] ? syscall_return_slowpath+0x550/0x550 [ 2658.925124] ? syscall_return_slowpath+0x2ac/0x550 [ 2658.930034] ? prepare_exit_to_usermode+0x350/0x350 [ 2658.935032] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2658.940376] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2658.945201] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2658.950366] RIP: 0033:0x454e79 [ 2658.953531] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2658.961216] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2658.968461] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 2018/03/30 22:45:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0x1}], {0x95}}, &(0x7f0000f59000)='GPL\x00', 0x3ff, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x7, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@map={0x18, 0xf, 0x1, 0x0, r0}], {0x95}}, &(0x7f0000000040)='GPL\x00', 0x20, 0xfffffe70, &(0x7f0000000080)=""/98, 0x41000}, 0xfffffffffffffe9e) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x3259a8eac2b25489, 0x9, 0x1, 0x1a, 0x11}, 0x2c) [ 2658.975707] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2658.982951] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2658.990199] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000050 [ 2659.002488] devpts: called with bogus options [ 2659.004999] devpts: called with bogus options 2018/03/30 22:45:41 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2659.035572] xprt_adjust_timeout: rq_timeout = 0! 2018/03/30 22:45:42 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x0, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x244, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r0, 0x8) mount(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000001840)='./file0/file0\x00', &(0x7f0000001880)='fuse\x00', 0x2, &(0x7f0000002500)="2d6e37f8205873bcb037429c30226aa307138e463a7225627b22e2bff9f9ec4c7bd542a6d9150d42d9d534841741611b71d516a6dc3d524f6889bbb05efc37c1435539163e643d892f01eeb1fec6d0c51a983f1835a0d3d3c138d743a7dc6d0d80ff06921c08daa1cf13fd3e09cd4bad1ee66e1594da53379e834c72909e68") mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r4 = getpid() perf_event_open(&(0x7f0000001a00)={0x0, 0x70, 0x0, 0x8, 0x0, 0x3, 0x0, 0xb8, 0x1000, 0x0, 0x3, 0x4, 0xfff, 0x4, 0x4dae, 0x40, 0x100000001, 0x6, 0x4, 0x0, 0x3, 0x753c, 0x6, 0x100, 0x1de, 0x6, 0x4, 0x1, 0x6, 0x4, 0x7, 0x3, 0x7fff, 0x80000000, 0x3, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x4}, 0x801, 0x400, 0x1, 0x4, 0x1, 0x9, 0x80000001}, r4, 0x7, r0, 0xb) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000002380)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000002580)="64657670747300dba920219fe0c49972db5d973d3db7d18a6845c720eff12cc800bee285458d4d11a2dea12da456ab0f4813f0806871ae638e9f590f575d098b310b596acf13c509d35eebc17df4a824877d58eed776b5df8e2567946744556bf6dafac083caef95c60f4e4380197e632f704e8ea7b0048dfe0c62c820fcade76940e4a98a6b00", 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001940)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff000000000000000000080300010100000000000000bcec280a9b38c5be40b793f426001f003d01f0fff0ffffff0000000000000000b5000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r7}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r5) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000023c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0e1c127df7274c9ea1675e02fa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a6b2b83c27812d818991d125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f7bb276536f567f03f062994da292b6db0000000000000000000000000000b5b1d9ed47215c0b18e53e6afd1c12b07ba3ff9bcdee5368d2082276b129cd7f001d5b94f178d943978260aff3eeb9e0297267eab10d406827b0af4a3626a1373fd50810973d52bb5f36000000000000000000000000000000"]) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/30 22:45:42 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8", 0x32}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x0, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r6 = gettid() perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x244, 0x80000000, 0x0, 0x7, 0x5, 0x3}, r6, 0xd, r4, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='mqueue\x00', 0x0, &(0x7f0000000240)="c5bdea9b496391f52deac807dd7df46031af762f74c804ff9be6610ef03a40b76e2b31347f50d272559c1f5d8738f3b2f28afe97f3e743dc178404f8f06f6aa31c13fa8a730ea9ac9c0200e87aa393a4274f4412787475fb77c5e4d5d04fecf1ff0a5589f11f11f3") getpid() 2018/03/30 22:45:42 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0x0, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) 2018/03/30 22:45:42 executing program 4: socketpair(0x8, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x10, 0xffffffff, 0x0, 0x100000000, 0x11, r0, 0x1}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x5, 0x63, 0x1, 0x0, 0x1, 0x80000000}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r2, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x0, 0x0, 0x0, 0x0, 0x78b1, 0x0, 0x0, 0x4992c766, 0x0, 0x81, 0x0, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x0, 0x90e, 0x9, 0x0, 0x0, 0x8, 0x0, 0x0, 0x20, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000000c0)={r1}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) sendmsg$kcm(r3, &(0x7f0000000400)={&(0x7f0000000100)=@in6={0xa, 0x4e21, 0x815, @loopback={0x0, 0x1}, 0x4}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)="55f50341e22a8308ddd2d262e6f9b5ac25bbe944a65b165dd7eaf11ca35c0681ef93b90d57c7fc8d2a613414b39fd49bf9915a5e0a200f3cf233f83aab4eeac6103ea32bcac4f0392eb527", 0x4b}], 0x1, &(0x7f0000000700)=ANY=[], 0x0, 0x8040}, 0x8000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5}, 0x2c) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r5 = gettid() perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x1, 0x3ff, 0x8, 0x7, 0x0, 0x9, 0xc0009, 0x0, 0x800, 0xf1fe, 0x2, 0x1, 0x1, 0xfffffffffffff70b, 0x7f, 0x3, 0xe7, 0x1, 0x7, 0x1, 0x9, 0x1, 0x0, 0x9, 0x9, 0x8, 0x5029, 0x0, 0x0, 0x6, 0x81, 0x9, 0x0, 0x1f, 0x100000000, 0x4, 0x0, 0xc8, 0x4, @perf_bp={&(0x7f0000000240), 0xc}, 0x9002, 0x8, 0xfffffffffffffffe, 0x7, 0x7, 0x1, 0x4}, r5, 0xa, r4, 0x3) 2018/03/30 22:45:42 executing program 1 (fault-call:19 fault-nth:81): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x10, 0x800, 0xfffffffffffff001, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x0, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r7, r4}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000280)='./file0/file0\x00', r4}, 0x10) gettid() mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='reiserfs\x00', 0x11, &(0x7f00000009c0)="90d3a2e77fb0b83289f767bb44ba9b72dc12fc7fdc6df418022cd3fd16a3cf8afe5a3ca95e7a411e557c9989023b011ca80f7977edbb2382f4cf23525d43259323e0aa051f922df33d01ee276fbd6faa77af1af04abcc838596b425126b608a54b594d03d163a69511dbbe505638c245b2d5593a58494fe6165b38da5d795d25155d07c6bae1947c4e999d") close(r1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000400)) [ 2659.176797] devpts: called with bogus options [ 2659.247010] devpts: called with bogus options [ 2659.259408] devpts: called with bogus options [ 2659.273774] devpts: called with bogus options 2018/03/30 22:45:42 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2659.304337] FAULT_INJECTION: forcing a failure. [ 2659.304337] name failslab, interval 1, probability 0, space 0, times 0 [ 2659.316089] CPU: 0 PID: 6347 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2659.323285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2659.332158] xprt_adjust_timeout: rq_timeout = 0! [ 2659.332634] Call Trace: [ 2659.332679] dump_stack+0x194/0x24d [ 2659.340413] hugetlbfs: Bad mount option: "" [ 2659.343618] ? arch_local_irq_restore+0x53/0x53 2018/03/30 22:45:42 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2659.343644] should_fail+0x8c0/0xa40 [ 2659.343661] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2659.343677] ? perf_trace_lock+0x900/0x900 [ 2659.343690] ? __lock_acquire+0x664/0x3e00 [ 2659.370005] ? find_held_lock+0x35/0x1d0 [ 2659.374083] ? __lock_is_held+0xb6/0x140 [ 2659.378163] ? check_same_owner+0x320/0x320 [ 2659.382488] ? __d_lookup+0x4f4/0x830 [ 2659.386292] ? rcu_note_context_switch+0x710/0x710 [ 2659.391237] should_failslab+0xec/0x120 [ 2659.395216] kmem_cache_alloc+0x47/0x760 [ 2659.399287] __d_alloc+0xc1/0xbd0 [ 2659.402741] ? shrink_dcache_for_umount+0x290/0x290 [ 2659.407742] ? d_alloc_parallel+0x1b40/0x1b40 [ 2659.412221] ? lock_release+0xa40/0xa40 [ 2659.416180] ? mark_held_locks+0xaf/0x100 [ 2659.420311] ? d_lookup+0x133/0x2e0 [ 2659.423922] ? d_lookup+0x1d5/0x2e0 [ 2659.427532] d_alloc+0x8e/0x340 [ 2659.430790] ? __d_alloc+0xbd0/0xbd0 [ 2659.434483] ? full_name_hash+0x9b/0xe0 [ 2659.438448] __rpc_lookup_create_exclusive+0x183/0x1d0 [ 2659.443702] ? down_write_nested+0x8b/0x120 [ 2659.448006] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 2659.452223] ? _down_write_nest_lock+0x120/0x120 [ 2659.457046] ? rpc_d_lookup_sb+0x115/0x1a0 [ 2659.461261] ? lock_release+0xa40/0xa40 [ 2659.465220] rpc_mkpipe_dentry+0xf8/0x360 [ 2659.469409] nfs4blocklayout_register_sb+0x4b/0x70 [ 2659.474322] rpc_pipefs_event+0x3a4/0x480 [ 2659.478474] ? nfs4blocklayout_net_init+0x460/0x460 [ 2659.483473] ? lock_release+0xa40/0xa40 [ 2659.487429] ? dput.part.20+0x1d9/0x830 [ 2659.491387] notifier_call_chain+0x136/0x2c0 [ 2659.495777] ? unregister_die_notifier+0x20/0x20 [ 2659.500521] ? down_read+0x96/0x150 [ 2659.504127] ? blocking_notifier_call_chain+0xe1/0x190 [ 2659.509385] ? __down_interruptible+0x6b0/0x6b0 [ 2659.514038] ? _raw_spin_unlock+0x22/0x30 [ 2659.518171] blocking_notifier_call_chain+0x102/0x190 [ 2659.524133] ? srcu_init_notifier_head+0x80/0x80 [ 2659.528882] rpc_fill_super+0x525/0xae0 [ 2659.532844] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2659.538026] ? security_capable+0x8e/0xc0 [ 2659.542158] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2659.547327] ? ns_capable_common+0xcf/0x160 [ 2659.551634] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2659.556803] mount_ns+0xc4/0x190 [ 2659.560152] rpc_mount+0x9e/0xd0 [ 2659.563501] mount_fs+0x66/0x2d0 [ 2659.566850] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2659.571412] ? may_umount+0xa0/0xa0 [ 2659.575024] ? _raw_read_unlock+0x22/0x30 [ 2659.579157] ? __get_fs_type+0x8a/0xc0 [ 2659.583034] do_mount+0xea4/0x2bb0 [ 2659.586556] ? __might_fault+0x110/0x1d0 [ 2659.590603] ? copy_mount_string+0x40/0x40 [ 2659.594818] ? __check_object_size+0x8b/0x530 [ 2659.599302] ? __might_sleep+0x95/0x190 [ 2659.603264] ? kasan_check_write+0x14/0x20 [ 2659.607478] ? _copy_from_user+0x99/0x110 [ 2659.611610] ? memdup_user+0x5e/0x90 [ 2659.615304] ? copy_mount_options+0x1f7/0x2e0 [ 2659.619782] SyS_mount+0xab/0x120 [ 2659.623212] ? copy_mnt_ns+0xb30/0xb30 [ 2659.627083] do_syscall_64+0x281/0x940 [ 2659.630953] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 2659.636471] ? syscall_return_slowpath+0x550/0x550 [ 2659.641381] ? syscall_return_slowpath+0x2ac/0x550 [ 2659.646294] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2659.651641] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2659.656472] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2659.661643] RIP: 0033:0x454e79 [ 2659.664811] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2659.672502] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2659.679753] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2659.687001] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2659.694258] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2659.701508] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000051 2018/03/30 22:45:42 executing program 7: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8", 0x32}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x0, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r5, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r4, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r5, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r6, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2659.729141] list_del corruption. prev->next should be 00000000a5a03b4b, but was 00000000e84d6972 [ 2659.739058] ------------[ cut here ]------------ [ 2659.743828] kernel BUG at lib/list_debug.c:53! [ 2659.748505] invalid opcode: 0000 [#1] SMP KASAN [ 2659.753172] Dumping ftrace buffer: [ 2659.756704] (ftrace buffer empty) [ 2659.760419] Modules linked in: [ 2659.763624] CPU: 0 PID: 6347 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #42 [ 2659.770800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 2018/03/30 22:45:42 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2659.780161] RIP: 0010:__list_del_entry_valid+0xef/0x150 [ 2659.785516] RSP: 0018:ffff8801a6f877a0 EFLAGS: 00010282 [ 2659.785628] devpts: called with bogus options [ 2659.790866] RAX: 0000000000000054 RBX: ffff88019beb69a0 RCX: 0000000000000000 [ 2659.790871] RDX: 0000000000000054 RSI: ffffc9000b302000 RDI: ffffed0034df0ee8 [ 2659.790875] RBP: ffff8801a6f877b8 R08: 1ffff10034df0e40 R09: 0000000000000000 [ 2659.790879] R10: ffff8801a6f87778 R11: 0000000000000000 R12: ffff88019beb6260 2018/03/30 22:45:42 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2659.790883] R13: 1ffff10034df0efd R14: ffff88019beb6820 R15: dffffc0000000000 [ 2659.790890] FS: 00007f4c11912700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 2659.790895] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2659.790899] CR2: 00005597af997aa8 CR3: 00000001aaf9b002 CR4: 00000000001606f0 [ 2659.790907] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2659.859460] devpts: called with bogus options [ 2659.860261] DR3: 0000000020000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 2659.860266] Call Trace: [ 2659.860284] __dentry_kill+0x260/0x700 [ 2659.860296] ? check_and_drop+0x1b0/0x1b0 [ 2659.882542] devpts: called with bogus options [ 2659.882591] ? d_path+0x930/0x930 [ 2659.890504] ? rcu_note_context_switch+0x710/0x710 [ 2659.895439] dput.part.20+0x5a0/0x830 [ 2659.899242] ? d_path+0x930/0x930 [ 2659.901624] devpts: called with bogus options [ 2659.902691] ? rpc_show_info+0x460/0x460 [ 2659.902698] ? d_delete+0x181/0x280 [ 2659.902710] dput+0x1f/0x30 [ 2659.917785] rpc_fill_super+0x628/0xae0 [ 2659.921770] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 2018/03/30 22:45:42 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x50, &(0x7f0000002440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000023c0)=r1, 0x4) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000024c0)={&(0x7f0000002040)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x4, 0x3, 0x0, 0x3}}, 0x80, &(0x7f0000002400)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x80) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000200)='mqueue\x00', 0x0, &(0x7f000000a000)) r3 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000001f40)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001800)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/27, 0x1b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/40, 0x28}, {&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/200, 0xc8}, {&(0x7f00000005c0)=""/60, 0x3c}, {&(0x7f0000000600)=""/105, 0x69}, {&(0x7f0000000680)=""/127, 0x7f}, {&(0x7f0000000700)=""/8, 0x8}], 0xa, &(0x7f0000000800)=""/4096, 0x1000}, 0x10000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000180)=0xf60) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0xd, 0x12, &(0x7f0000001840)=@raw=[@jmp={0x5, 0x1, 0xa, 0x6, 0xf, 0x0, 0x10}, @map={0x18, 0xf, 0x1, 0x0, 0x1}, @alu={0x7, 0x100000000, 0xb, 0x0, 0x1, 0xfffffffe, 0xc}, @ldst={0x2, 0x1, 0x1, 0x9, 0x3, 0x0, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x7, 0x0, 0xffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x21}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000380)='syzkaller\x00', 0x20, 0xec, &(0x7f0000001900)=""/236, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001b00)={r6, 0x50, &(0x7f0000001a80)={0x0, 0x0}}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002200)={r5, &(0x7f0000002500)="b8821bf2f171640398fd49dd0a758bf03c20e95f40e0a43d4735c8c5a7431fb8cd5281db0af625181aad5916d97010c64872eb5e003ccce15467c0195ae917255029a627cd83820ad8f9c5ebecf14988ff4424db4fba4e267b228f561bca821093802eddbee381d5f49de4ef0926f6d3a342505648a6180ea7ab9bb9992f243cc2f5c165f10de701a1de0ff03fc64960c106be98d6d3cded16b59fa38326197440c5b1597dcf51dc1044fe2dc9fbcd6f252ae2e87464b3ac38b6229dc01b614d90e2ef", &(0x7f0000002600)=""/4096}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={r6, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) mount(&(0x7f0000002140)='./file0\x00', &(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)='squashfs\x00', 0x2000048, &(0x7f0000002300)="0fc214c1c09331c852702c28c2b1661503b72e2a46d3b9454116845e02b5a91282e1538deee2478520ef27ed0879bf5cf51d1524cabd473723d833ea15db9dc6cadefa55be03fd1115a12159925c1751aae089e454f4ae511e0c023f44cb8527261c0b6135b9ef2d38f37c924e833619a7e336cce350d1d61f37913686472cc379c6dfd1ecb6eb3eeb5980ae6f4de0e624bdfd04e7c51f6091bbc1e578cc70c8c3a388bc") bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002100)=r7, 0x4) close(r3) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x24000, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) [ 2659.926959] ? security_capable+0x8e/0xc0 [ 2659.931108] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2659.934924] hugetlbfs: Bad mount option: "" [ 2659.936288] ? ns_capable_common+0xcf/0x160 [ 2659.936302] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2659.936316] mount_ns+0xc4/0x190 [ 2659.936325] rpc_mount+0x9e/0xd0 [ 2659.936337] mount_fs+0x66/0x2d0 [ 2659.960225] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2659.964785] ? may_umount+0xa0/0xa0 [ 2659.968396] ? _raw_read_unlock+0x22/0x30 [ 2659.972530] ? __get_fs_type+0x8a/0xc0 [ 2659.976394] do_mount+0xea4/0x2bb0 [ 2659.979918] ? __might_fault+0x110/0x1d0 [ 2659.983961] ? copy_mount_string+0x40/0x40 [ 2659.988171] ? __check_object_size+0x8b/0x530 [ 2659.992642] ? __might_sleep+0x95/0x190 [ 2659.996600] ? kasan_check_write+0x14/0x20 [ 2660.000819] ? _copy_from_user+0x99/0x110 [ 2660.004946] ? memdup_user+0x5e/0x90 [ 2660.008634] ? copy_mount_options+0x1f7/0x2e0 [ 2660.013106] SyS_mount+0xab/0x120 [ 2660.016534] ? copy_mnt_ns+0xb30/0xb30 [ 2660.020398] do_syscall_64+0x281/0x940 [ 2660.024260] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 2660.029772] ? syscall_return_slowpath+0x550/0x550 [ 2660.034673] ? syscall_return_slowpath+0x2ac/0x550 [ 2660.039578] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2660.044916] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2660.049739] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2660.054903] RIP: 0033:0x454e79 [ 2660.058069] RSP: 002b:00007f4c11911c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2660.065753] RAX: ffffffffffffffda RBX: 00007f4c119126d4 RCX: 0000000000454e79 [ 2660.073007] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 2660.080262] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 2660.087515] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 2660.094765] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000051 [ 2660.102019] Code: 4c 89 e2 48 c7 c7 00 bf 75 87 e8 f5 cc 46 fe 0f 0b 48 c7 c7 60 bf 75 87 e8 e7 cc 46 fe 0f 0b 48 c7 c7 c0 bf 75 87 e8 d9 cc 46 fe <0f> 0b 48 c7 c7 20 c0 75 87 e8 cb cc 46 fe 0f 0b 48 89 df 48 89 [ 2660.121154] RIP: __list_del_entry_valid+0xef/0x150 RSP: ffff8801a6f877a0 [ 2660.128240] ---[ end trace 7df63f7bd5ccbc36 ]--- [ 2660.133020] Kernel panic - not syncing: Fatal exception [ 2660.138799] Dumping ftrace buffer: [ 2660.142315] (ftrace buffer empty) [ 2660.145997] Kernel Offset: disabled [ 2660.149598] Rebooting in 86400 seconds..